Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0442.pdf.exe

Overview

General Information

Sample name:0442.pdf.exe
renamed because original name is a hash value
Original sample name: .pdf.exe
Analysis ID:1580689
MD5:4f6b2b9ee57c50d6c505d0cdada4803e
SHA1:ad7dee6f1f71c4fe6299170a160592f139390e12
SHA256:62410e8399acf7834c74012783bde3fe9ff244e048141c4a96a65bec06895f37
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Enables network access during safeboot for specific services
Enables remote desktop connection
Initial sample is a PE file and has a suspicious name
Uses an obfuscated file name to hide its real file extension (double extension)
Uses ping.exe to check the status of other devices and networks
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Stores files to the Windows start menu directory
Stores large binary data to the registry
Tries to disable installed Antivirus / HIPS / PFW
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w7x64
  • 0442.pdf.exe (PID: 3412 cmdline: "C:\Users\user\Desktop\0442.pdf.exe" MD5: 4F6B2B9EE57C50D6C505D0CDADA4803E)
    • msiexec.exe (PID: 3524 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ms.msi" /qn MD5: AC2E7152124CEED36846BD1B6592A00F)
    • cmd.exe (PID: 3532 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\start.bat" " MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • PING.EXE (PID: 3580 cmdline: ping 8.8.8.8 MD5: 5FB30FE90736C7FC77DE637021B1CE7C)
    • AcroRd32.exe (PID: 3552 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc.pdf" MD5: 2F8D93826B8CBF9290BC57535C7A6817)
      • RdrCEF.exe (PID: 3984 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 MD5: 326A645391A97C760B60C558A35BB068)
    • AcroRd32.exe (PID: 3596 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc2.pdf" MD5: 2F8D93826B8CBF9290BC57535C7A6817)
  • msiexec.exe (PID: 3656 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • ROMFUSClient.exe (PID: 3892 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 3916 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 1512 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 1724 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 3496 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start MD5: 63D0964168B927D00064AA684E79A300)
      • ROMServer.exe (PID: 3516 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start MD5: F3D74B072B9697CF64B0B8445FDC8128)
  • ROMServer.exe (PID: 3580 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" MD5: F3D74B072B9697CF64B0B8445FDC8128)
    • ROMFUSClient.exe (PID: 3992 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" MD5: 63D0964168B927D00064AA684E79A300)
    • ROMFUSClient.exe (PID: 3968 cmdline: "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray MD5: 63D0964168B927D00064AA684E79A300)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          SourceRuleDescriptionAuthorStrings
          00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              SourceRuleDescriptionAuthorStrings
              9.0.ROMFUSClient.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                10.0.ROMServer.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\0442.pdf.exe", CommandLine: "C:\Users\user\Desktop\0442.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\0442.pdf.exe, NewProcessName: C:\Users\user\Desktop\0442.pdf.exe, OriginalFileName: C:\Users\user\Desktop\0442.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Users\user\Desktop\0442.pdf.exe", ProcessId: 3412, ProcessName: 0442.pdf.exe
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe, ProcessId: 3552, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0442.pdf.exeReversingLabs: Detection: 26%
                  Source: 0442.pdf.exeVirustotal: Detection: 47%Perma Link
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\EULA.rtfJump to behavior
                  Source: 0442.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 0442.pdf.exe
                  Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeFile opened: c:
                  Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeDirectory queried: number of queries: 1224
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF7B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,ShowWindow,ShowWindow,SetDlgItemTextW,ShowWindow,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_000000013FF7B190
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF640BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_000000013FF640BC
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF8FCA0 FindFirstFileExA,0_2_000000013FF8FCA0

                  Networking

                  barindex
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry value created: NULL Service
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 8.8.8.8
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 101.99.91.150:5651
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.91.150
                  Source: ROMServer.exe, 0000000A.00000002.386473610.0000000000D40000.00000004.00000020.00020000.00000000.sdmp, AledensoftIpcServer.dll.8.dr, ROMwln.dll.8.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                  Source: ROMFUSClient.exe, 00000009.00000000.383021040.00000000008E4000.00000002.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.384080641.00000000009FE000.00000002.00000001.01000000.00000008.sdmp, ROMServer.exe, 00000011.00000002.765338203.000000000150C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.000000000253C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.000000000243D000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe.8.dr, Taiwan.lg.8.drString found in binary or memory: http://litemanager.com/
                  Source: ROMServer.exe, 00000011.00000002.765338203.0000000001513000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/03Q
                  Source: ROMFUSClient.exe, 00000014.00000002.765257050.0000000002543000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/03T
                  Source: ROMServer.exe, 00000011.00000002.765338203.000000000150C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.000000000253C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://litemanager.com/1
                  Source: ROMFUSClient.exe, 00000009.00000000.383021040.00000000008E4000.00000002.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.384080641.00000000009FE000.00000002.00000001.01000000.00000008.sdmp, ROMFUSClient.exe.8.drString found in binary or memory: http://litemanager.ru/
                  Source: ROMServer.exe, 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, ROMServer.exe0.8.drString found in binary or memory: http://litemanager.ru/noip.txtU
                  Source: ROMServer.exe, 0000000A.00000002.386473610.0000000000D40000.00000004.00000020.00020000.00000000.sdmp, AledensoftIpcServer.dll.8.dr, ROMwln.dll.8.drString found in binary or memory: http://ocsp.comodoca.com0
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: http://ocsp.sectigo.com0
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://ocsp.thawte.com0
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://s2.symcb.com0
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://sv.symcd.com0&
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                  Source: ROMFUSClient.exe, 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, ROMFUSClient.exe, 00000009.00000003.386948729.000000000259F000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000A.00000003.386085562.00000000028AF000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000A.00000000.383524670.0000000000951000.00000020.00000001.01000000.00000008.sdmp, ROMFUSClient.exe, 0000000D.00000003.394358890.00000000026CF000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000E.00000003.392280910.00000000026AF000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000F.00000003.411410672.000000000265F000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000010.00000003.410549584.000000000279F000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000011.00000002.765338203.000000000147F000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000013.00000002.765264811.00000000024CF000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.00000000024AF000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe.8.dr, ROMServer.exe0.8.drString found in binary or memory: http://www.indyproject.org/
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://www.symauth.com/cps0(
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: http://www.symauth.com/rpa00
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: https://d.symcb.com/cps0%
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drString found in binary or memory: https://d.symcb.com/rpa0
                  Source: ROMFUSClient.exe, 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, ROMFUSClient.exe.8.dr, ROMServer.exe0.8.drString found in binary or memory: https://litemanager.com/romversion.txt
                  Source: ROMFUSClient.exe, 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, ROMFUSClient.exe.8.dr, ROMServer.exe0.8.drString found in binary or memory: https://litemanager.com/soft/pro/ROMServer.zip
                  Source: ROMFUSClient.exe.8.drString found in binary or memory: https://sectigo.com/CPS0
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeWindow created: window name: CLIPBRDWNDCLASS

                  System Summary

                  barindex
                  Source: initial sampleStatic PE information: Filename: 0442.pdf.exe
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeMemory allocated: 770B0000 page execute and read and write
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMemory allocated: 770B0000 page execute and read and write
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeMemory allocated: 770B0000 page execute and read and write
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeMemory allocated: 770B0000 page execute and read and write
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMemory allocated: 770B0000 page execute and read and write
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMemory allocated: 770B0000 page execute and read and write
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF5C2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_000000013FF5C2F0
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49c0c0.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{71FFA475-24D5-44FB-A51F-39B699E3D82C}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49c0c2.ipiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49c0c2.ipiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIC938.tmpJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49c0c4.msiJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49c0c4.msiJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile created: C:\Windows\SysWOW64\ROMwln.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\49c0c2.ipiJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF71F200_2_000000013FF71F20
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF7CE880_2_000000013FF7CE88
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF55E240_2_000000013FF55E24
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF649280_2_000000013FF64928
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF5F9300_2_000000013FF5F930
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF807540_2_000000013FF80754
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6A4AC0_2_000000013FF6A4AC
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF734840_2_000000013FF73484
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF7B1900_2_000000013FF7B190
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6AF180_2_000000013FF6AF18
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF78DF40_2_000000013FF78DF4
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF807540_2_000000013FF80754
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF72D580_2_000000013FF72D58
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF88C1C0_2_000000013FF88C1C
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF74B980_2_000000013FF74B98
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6BB900_2_000000013FF6BB90
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF65B600_2_000000013FF65B60
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF95AF80_2_000000013FF95AF8
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF51AA40_2_000000013FF51AA4
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF72AB00_2_000000013FF72AB0
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF8FA940_2_000000013FF8FA94
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF61A480_2_000000013FF61A48
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF889A00_2_000000013FF889A0
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF739640_2_000000013FF73964
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6C96C0_2_000000013FF6C96C
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF548400_2_000000013FF54840
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF8C8380_2_000000013FF8C838
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF576C00_2_000000013FF576C0
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF925500_2_000000013FF92550
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6B5340_2_000000013FF6B534
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF753F00_2_000000013FF753F0
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF5A3100_2_000000013FF5A310
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF5C2F00_2_000000013FF5C2F0
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF572880_2_000000013FF57288
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6126C0_2_000000013FF6126C
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF721D00_2_000000013FF721D0
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6F1800_2_000000013FF6F180
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF920800_2_000000013FF92080
                  Source: ROMViewer.exe.8.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe.8.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMServer.exe0.8.drStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                  Source: ROMFUSClient.exe.8.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMServer.exe.8.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMServer.exe0.8.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMViewer.exe.8.drStatic PE information: Number of sections : 11 > 10
                  Source: ROMViewer.exe.8.drStatic PE information: Resource name: RT_RCDATA type: Delphi compiled form 'TfmEditBinaryValue'
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameISRegSvr.dll vs 0442.pdf.exe
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002F1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0442.pdf.exe
                  Source: 0442.pdf.exe, 00000000.00000003.369907280.0000000000136000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAcroRd32.exe< vs 0442.pdf.exe
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002E7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0442.pdf.exe
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002E7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSetAllUsers.dll< vs 0442.pdf.exe
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002F02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0442.pdf.exe
                  Source: 0442.pdf.exe, 00000000.00000003.366872053.0000000002F10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_IsIcoRes.exe< vs 0442.pdf.exe
                  Source: classification engineClassification label: mal84.troj.evad.winEXE@41/43@0/2
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF5B6D8 GetLastError,FormatMessageW,LocalFree,0_2_000000013FF5B6D8
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF78624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_000000013FF78624
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - ServerJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeFile created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIconsJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ROMFUSLocal
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeMutant created: \Sessions\1\BaseNamedObjects\Local\ROMFUSTray
                  Source: C:\Users\user\Desktop\0442.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_4830929Jump to behavior
                  Source: Yara matchFile source: 9.0.ROMFUSClient.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.ROMServer.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe, type: DROPPED
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\start.bat" "
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................(...............o.f..............<........................V(.V.. ........`.J....p@".............................................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................(...............................0|......................?.V(.V....................".............H...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................8...............C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.>.............x.......D..................J....Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................8...............p.i.n.g........./.......................0........$.J............/...............X...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................8............... .8...8...8...8. .........................V(.V..p.i.n.g.........p@".............(...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................8............................... .........................V(.V..p.i.n.g.........p@".............(...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................$.......................................................?.V(.V....................".............H...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................$...............C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.>.............x.......D..................J....Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................$...............c.l.s.........../.......................0........$.J............/...............X...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................$.........................................................V(.V..c.l.s...........p@".............(...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d.......................................................?.V(.V....................".............H...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d...............C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.>.............x.......D..................J....Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d...............d.e.l.........../.......................0........$.J............/...............X...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d.........................................................V(.V..d.e.l...........p@".............................................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d.........................................................V(.V..d.e.l...........p@".............(...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ...................J....................................@c.J..... ......p.................Ow............................X.......................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d.......................................................?.V(.V....................".............H...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d...............c.l.s.........../.......................0........$.J............/...............X...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d.........................................................V(.V..c.l.s...........p@".............(...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d.......................................................?.V(.V....................".............H...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d...............e.x.i.t..........&.J....................0........[1.............X%.J............X...............................Jump to behavior
                  Source: C:\Windows\System32\cmd.exeConsole Write: ................d.........................................................V(.V..e.x.i.t.........p@".............(...............................Jump to behavior
                  Source: 0442.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                  Source: C:\Users\user\Desktop\0442.pdf.exeFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 0442.pdf.exeReversingLabs: Detection: 26%
                  Source: 0442.pdf.exeVirustotal: Detection: 47%
                  Source: C:\Users\user\Desktop\0442.pdf.exeFile read: C:\Users\user\Desktop\0442.pdf.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\0442.pdf.exe "C:\Users\user\Desktop\0442.pdf.exe"
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ms.msi" /qn
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\start.bat" "
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc.pdf"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 8.8.8.8
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc2.pdf"
                  Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: unknownProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe"
                  Source: C:\Windows\System32\PING.EXEProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                  Source: C:\Windows\System32\PING.EXEProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ms.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\start.bat" "Jump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc.pdf"Jump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc2.pdf"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 8.8.8.8Jump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043Jump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /startJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstallJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewallJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: devrtl.dllJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: devrtl.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\System32\msiexec.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: devrtl.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: devrtl.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64win.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64cpu.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wkscli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64win.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64cpu.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wkscli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winnsi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: propsys.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: sfc_os.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: devrtl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: mpr.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64win.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64cpu.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wkscli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64win.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wow64cpu.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wkscli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: avifil32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wsock32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: uxtheme.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: winnsi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: ntmarta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: bcrypt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msrle32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msvidc32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: msyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iyuv_32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: tsbyuv.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: iccvid.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeSection loaded: shcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64win.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64cpu.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wkscli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winnsi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: shcore.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64win.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wow64cpu.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winmm.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: version.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: avicap32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msvfw32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: netutils.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: srvcli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wkscli.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: msacm32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dsound.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: powrprof.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dwmapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: wtsapi32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winsta.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: security.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: secur32.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: fwpuclnt.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: idndl.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: iphlpapi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: winnsi.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\Desktop\0442.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: Start LM-Server.lnk.8.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Uninstall LiteManager - Server.lnk.8.drLNK file: ..\..\..\..\..\..\Windows\SysWOW64\msiexec.exe
                  Source: Stop LM-Server.lnk.8.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Settings for LM-Server.lnk.8.drLNK file: ..\..\..\..\..\..\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: 0442.pdf.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: 0442.pdf.exeStatic file information: File size 11409543 > 1048576
                  Source: 0442.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 0442.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 0442.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 0442.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 0442.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 0442.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 0442.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: 0442.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: 0442.pdf.exe
                  Source: 0442.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 0442.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 0442.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 0442.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 0442.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\0442.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_4830929Jump to behavior
                  Source: 0442.pdf.exeStatic PE information: section name: .didat
                  Source: 0442.pdf.exeStatic PE information: section name: _RDATA
                  Source: ROMViewer.exe.8.drStatic PE information: section name: .didata
                  Source: ROMFUSClient.exe.8.drStatic PE information: section name: .didata
                  Source: ROMwln.dll.8.drStatic PE information: section name: .didata
                  Source: ROMServer.exe.8.drStatic PE information: section name: .didata
                  Source: HookDrv.dll.8.drStatic PE information: section name: .didata
                  Source: ROMServer.exe0.8.drStatic PE information: section name: .didata
                  Source: ROMwln.dll.10.drStatic PE information: section name: .didata
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF95166 push rsi; retf 0_2_000000013FF95167
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF95156 push rsi; retf 0_2_000000013FF95157
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeJump to dropped file
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile created: C:\Windows\SysWOW64\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile created: C:\Windows\SysWOW64\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\LiteManager Pro - Server\EULA.rtfJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\romserver.exe
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - ServerJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Start LM-Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Uninstall LiteManager - Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Stop LM-Server.lnkJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\Settings for LM-Server.lnkJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (132).png
                  Source: Possible double extension: pdf.exeStatic PE information: 0442.pdf.exe
                  Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SYSTEM\LiteManager\v3.4\Server\Parameters NoIPSettingsJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exeJump to dropped file
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeDropped PE file which has not been started: C:\Windows\SysWOW64\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dllJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exeJump to dropped file
                  Source: C:\Windows\System32\msiexec.exe TID: 3632Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\msiexec.exe TID: 3780Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\msiexec.exe TID: 3780Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe TID: 3484Thread sleep count: 46 > 30
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe TID: 2104Thread sleep time: -156000s >= -30000s
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeLast function: Thread delayed
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF7B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,ShowWindow,ShowWindow,SetDlgItemTextW,ShowWindow,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_000000013FF7B190
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF640BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_000000013FF640BC
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF8FCA0 FindFirstFileExA,0_2_000000013FF8FCA0
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF816A4 VirtualQuery,GetSystemInfo,0_2_000000013FF816A4
                  Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF876D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013FF876D8
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF90D20 GetProcessHeap,0_2_000000013FF90D20
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess token adjusted: Debug
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /startJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF82D50 SetUnhandledExceptionFilter,_invalid_parameter_noinfo,0_2_000000013FF82D50
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF876D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013FF876D8
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF82510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000013FF82510
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF83354 SetUnhandledExceptionFilter,0_2_000000013FF83354
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF83170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000013FF83170
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF7B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,ShowWindow,ShowWindow,SetDlgItemTextW,ShowWindow,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_000000013FF7B190
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ms.msi" /qnJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\start.bat" "Jump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc.pdf"Jump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc2.pdf"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 8.8.8.8Jump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstallJump to behavior
                  Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewallJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstallJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewallJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeProcess created: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe "C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeFile opened: Windows Firewall: C:\Windows\SysWOW64\FirewallAPI.dll
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF6DC70 cpuid 0_2_000000013FF6DC70
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_000000013FF7A2CC
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductId
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF80754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_000000013FF80754
                  Source: C:\Users\user\Desktop\0442.pdf.exeCode function: 0_2_000000013FF64EB0 GetVersionExW,0_2_000000013FF64EB0
                  Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeDirectory queried: number of queries: 1224

                  Remote Access Functionality

                  barindex
                  Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server AllowRemoteRPC
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  1
                  Replication Through Removable Media
                  1
                  Command and Scripting Interpreter
                  1
                  Scripting
                  1
                  Exploitation for Privilege Escalation
                  2
                  Disable or Modify Tools
                  OS Credential Dumping1
                  System Time Discovery
                  1
                  Remote Desktop Protocol
                  1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Obfuscated Files or Information
                  LSASS Memory11
                  Peripheral Device Discovery
                  Remote Desktop Protocol1
                  Clipboard Data
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  Windows Service
                  1
                  Windows Service
                  1
                  Software Packing
                  Security Account Manager12
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Registry Run Keys / Startup Folder
                  11
                  Process Injection
                  1
                  DLL Side-Loading
                  NTDS55
                  System Information Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                  Registry Run Keys / Startup Folder
                  1
                  File Deletion
                  LSA Secrets2
                  Security Software Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts222
                  Masquerading
                  Cached Domain Credentials1
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Modify Registry
                  DCSync1
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  Remote System Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Network Configuration Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1580689 Sample: 0442.pdf.exe Startdate: 25/12/2024 Architecture: WINDOWS Score: 84 61 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 Sigma detected: Suspicious Double Extension File Execution 2->65 67 2 other signatures 2->67 7 ROMServer.exe 2->7         started        11 msiexec.exe 99 55 2->11         started        14 0442.pdf.exe 11 2->14         started        process3 dnsIp4 57 101.99.91.150, 49163, 49164, 49165 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 7->57 69 Enables remote desktop connection 7->69 71 Enables network access during safeboot for specific services 7->71 16 ROMFUSClient.exe 7->16         started        18 ROMFUSClient.exe 7->18         started        49 C:\Program Files (x86)\...\ROMServer.exe, PE32 11->49 dropped 51 stop_server_51B516...3C56354EA2277C2.exe, PE32 11->51 dropped 53 config_server_B6BD...764F06ADFFD6458.exe, PE32 11->53 dropped 55 9 other files (none is malicious) 11->55 dropped 20 ROMFUSClient.exe 1 11->20         started        22 ROMFUSClient.exe 1 11->22         started        24 ROMFUSClient.exe 11->24         started        26 cmd.exe 14->26         started        29 AcroRd32.exe 25 14->29         started        31 AcroRd32.exe 20 14->31         started        33 msiexec.exe 14->33         started        file5 signatures6 process7 signatures8 35 ROMServer.exe 1 20->35         started        38 ROMServer.exe 22->38         started        40 ROMServer.exe 24->40         started        73 Uses ping.exe to check the status of other devices and networks 26->73 42 PING.EXE 26->42         started        44 RdrCEF.exe 2 29->44         started        process9 dnsIp10 47 C:\Windows\SysWOW64\ROMwln.dll, PE32 35->47 dropped 59 192.168.2.255, 137, 138 unknown unknown 44->59 file11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  0442.pdf.exe26%ReversingLabsWin64.Trojan.Uztuby
                  0442.pdf.exe47%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe8%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\ROMwln.dll0%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\files\ROMServer.exe3%ReversingLabs
                  C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe3%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ARPPRODUCTICON.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\ROMServer.exe_9D09B2BC25A2414CBD848E2B75898676.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\config_server_B6BD2967C67B44649764F06ADFFD6458.exe0%ReversingLabs
                  C:\Windows\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\stop_server_51B516B87C64408FA3C56354EA2277C2.exe0%ReversingLabs
                  C:\Windows\SysWOW64\ROMwln.dll0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://litemanager.com/03Q0%Avira URL Cloudsafe
                  http://litemanager.com/03T0%Avira URL Cloudsafe
                  No contacted domains info
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://litemanager.com/1ROMServer.exe, 00000011.00000002.765338203.000000000150C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.000000000253C000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    http://litemanager.ru/ROMFUSClient.exe, 00000009.00000000.383021040.00000000008E4000.00000002.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.384080641.00000000009FE000.00000002.00000001.01000000.00000008.sdmp, ROMFUSClient.exe.8.drfalse
                      high
                      http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0ROMFUSClient.exe.8.drfalse
                        high
                        https://litemanager.com/soft/pro/ROMServer.zipROMFUSClient.exe, 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, ROMFUSClient.exe.8.dr, ROMServer.exe0.8.drfalse
                          high
                          https://sectigo.com/CPS0ROMFUSClient.exe.8.drfalse
                            high
                            http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#ROMFUSClient.exe.8.drfalse
                              high
                              https://litemanager.com/romversion.txtROMFUSClient.exe, 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, ROMFUSClient.exe.8.dr, ROMServer.exe0.8.drfalse
                                high
                                http://crl.thawte.com/ThawteTimestampingCA.crl00442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drfalse
                                  high
                                  http://ocsp.sectigo.com0ROMFUSClient.exe.8.drfalse
                                    high
                                    http://www.symauth.com/rpa000442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drfalse
                                      high
                                      http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zROMFUSClient.exe.8.drfalse
                                        high
                                        http://ocsp.thawte.com00442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drfalse
                                          high
                                          http://litemanager.com/03QROMServer.exe, 00000011.00000002.765338203.0000000001513000.00000004.00001000.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://litemanager.ru/noip.txtUROMServer.exe, 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, ROMServer.exe0.8.drfalse
                                            high
                                            http://litemanager.com/03TROMFUSClient.exe, 00000014.00000002.765257050.0000000002543000.00000004.00001000.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://litemanager.com/ROMFUSClient.exe, 00000009.00000000.383021040.00000000008E4000.00000002.00000001.01000000.00000007.sdmp, ROMServer.exe, 0000000A.00000000.384080641.00000000009FE000.00000002.00000001.01000000.00000008.sdmp, ROMServer.exe, 00000011.00000002.765338203.000000000150C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.000000000253C000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.000000000243D000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe.8.dr, Taiwan.lg.8.drfalse
                                              high
                                              http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sROMFUSClient.exe.8.drfalse
                                                high
                                                http://www.indyproject.org/ROMFUSClient.exe, 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, ROMFUSClient.exe, 00000009.00000003.386948729.000000000259F000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000A.00000003.386085562.00000000028AF000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000A.00000000.383524670.0000000000951000.00000020.00000001.01000000.00000008.sdmp, ROMFUSClient.exe, 0000000D.00000003.394358890.00000000026CF000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 0000000E.00000003.392280910.00000000026AF000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 0000000F.00000003.411410672.000000000265F000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000010.00000003.410549584.000000000279F000.00000004.00001000.00020000.00000000.sdmp, ROMServer.exe, 00000011.00000002.765338203.000000000147F000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000013.00000002.765264811.00000000024CF000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe, 00000014.00000002.765257050.00000000024AF000.00000004.00001000.00020000.00000000.sdmp, ROMFUSClient.exe.8.dr, ROMServer.exe0.8.drfalse
                                                  high
                                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#ROMFUSClient.exe.8.drfalse
                                                    high
                                                    http://www.symauth.com/cps0(0442.pdf.exe, 00000000.00000003.366872053.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, 0442.pdf.exe, 00000000.00000003.366872053.0000000002EF6000.00000004.00000020.00020000.00000000.sdmp, ms.msi.0.drfalse
                                                      high
                                                      http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#ROMFUSClient.exe.8.drfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        101.99.91.150
                                                        unknownMalaysia
                                                        45839SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMYfalse
                                                        IP
                                                        192.168.2.255
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1580689
                                                        Start date and time:2024-12-25 17:21:56 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 1s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                        Run name:Run with higher sleep bypass
                                                        Number of analysed new started processes analysed:22
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:0442.pdf.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name: .pdf.exe
                                                        Detection:MAL
                                                        Classification:mal84.troj.evad.winEXE@41/43@0/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 100%
                                                        • Number of executed functions: 77
                                                        • Number of non-executed functions: 91
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 23.195.60.171, 95.100.170.49, 95.100.170.57
                                                        • Excluded domains from analysis (whitelisted): ssl.adobe.com.edgekey.net, armmf.adobe.com, e4578.dscb.akamaiedge.net, acroipm2.adobe.com.edgesuite.net, a122.dscd.akamai.net, acroipm2.adobe.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        No simulations
                                                        No context
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY94e.exeGet hashmaliciousRemcosBrowse
                                                        • 101.99.94.64
                                                        94e.exeGet hashmaliciousRemcosBrowse
                                                        • 101.99.94.64
                                                        0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                        • 101.99.94.64
                                                        file.exeGet hashmaliciousInvicta Stealer, XWormBrowse
                                                        • 101.99.92.189
                                                        http://www.recorderkorea.com/shop/proc/indb.cart.tab.php?action=ok&tab=today&type=delete&returnUrl=https://23058.hicleanly.ca/uoeujd/shuhsdy/odog/kratos/REDIRECT/Zl2jyY/compliance@yourmom.comGet hashmaliciousUnknownBrowse
                                                        • 101.99.81.34
                                                        lg1wwLsmCX.exeGet hashmaliciousUnknownBrowse
                                                        • 101.99.75.174
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        C:\Program Files (x86)\LiteManager Pro - Server\HookDrv.dll0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                          0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                            gBYz86HSwI.msiGet hashmaliciousUnknownBrowse
                                                              0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                  0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                    C:\Program Files (x86)\LiteManager Pro - Server\AledensoftIpcServer.dll0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                      0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                        gBYz86HSwI.msiGet hashmaliciousUnknownBrowse
                                                                          0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                            0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                              0438.pdf.exeGet hashmaliciousUnknownBrowse
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):23375
                                                                                Entropy (8bit):5.134608756500372
                                                                                Encrypted:false
                                                                                SSDEEP:384:RH7WtPtOCqZ+cNbynfhzOj3I6oFJsZssOVa:RH6tPtOCqZ+cNbynf5H6oFJWXMa
                                                                                MD5:B91D0351210AACD75AD087A91436776A
                                                                                SHA1:AA88E962EDD525048B4748FBC34AD4E605A64BF2
                                                                                SHA-256:E3FB271F9E91154B6B46A5E2232FE45F900BE4917DBB2D035BE8E9D36AAEB9F7
                                                                                SHA-512:74987422AF2E66265676270F6F357DEB3DE856BE8E05EBF4BE373D5A888A9A73FA75F66F5C9C91B33D9E9A3C3E96A9C50B41CCB65291D1BEBE38374F6F39236F
                                                                                Malicious:false
                                                                                Preview:...@IXOS.@.....@.Z.Y.@.....@.....@.....@.....@.....@......&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}..LiteManager Pro - Server..ms.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}.....@.....@.....@.....@.......@.....@.....@.......@......LiteManager Pro - Server......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{3244CDE6-6414-4399-B0D5-424562747210}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{4D4D18AA-F74D-4291-B5A9-93C3CC48B75F}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{641F154A-FEEF-4FA7-B5BF-414DB1DB8390}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}.@......&.{596F4636-5D51-49F5-B3B4-F3C366E9DC23}&.{00000000-0000-0000-0000-000000000000}.@......&.{A3DC5A2F-2249-4674-BE
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):132032
                                                                                Entropy (8bit):6.10195829980833
                                                                                Encrypted:false
                                                                                SSDEEP:3072:sh/1J7RYdzZU4Z5tegH1q888888888888W888888888882zgP:sh/jIZPZ5tJ8888888888888W888888s
                                                                                MD5:C40455A478E0B76521130D9DAAAADC4B
                                                                                SHA1:42DE923D5E36A9F56B002DD66DB245BC44480089
                                                                                SHA-256:308085BC357BF3A3BEE0D662FCC01628E9EE2FFD478AE0F1E7140939AD99B892
                                                                                SHA-512:76ED6D763F603BCAA7FE186C0A7449E614DCDB18036F7587C6E5A11C3F3269E400E3D2062856CC280AC20C094617924783B6C360F25AF66767DCC53C2F3045C9
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: gBYz86HSwI.msi, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....xK............................p........ ..........................................................................\.......\...............................x#...................................................................................text...$........................... ..`.itext.............................. ..`.data...0.... ......................@....bss....xN...@...........................idata..\...........................@....edata..\............&..............@..@.reloc..x#.......$...(..............@..B.rsrc................L..............@..@....................................@..@........................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Rich Text Format data, version 1, ANSI, code page 1251, default language ID 1049
                                                                                Category:dropped
                                                                                Size (bytes):58679
                                                                                Entropy (8bit):4.738446173390891
                                                                                Encrypted:false
                                                                                SSDEEP:768:bkJC7UF9eVWSlBY8Aq9CBGDtD8gX1ZDCZjewbAsCw1vPDQuJPQzusxxeCNHnPPsT:htwqueMZYU
                                                                                MD5:BAED4E7AF33F77350D454B69317EE63B
                                                                                SHA1:2B598774F0C73850A36117F29EA8DAC57BE1C138
                                                                                SHA-256:671D65183C39E53FC1759C45B105A0FBE2D3A216E4099B66D5FCF274EA625E07
                                                                                SHA-512:E740997BDECB8F907A000D01BF3E823898A1289D1DBFAE5BF342D4BCB6FF09D258317955F4FD858FF6B239E5BA08E49E90CDEC06E24DABDB18C1CF2D8943590C
                                                                                Malicious:false
                                                                                Preview:{\rtf1\ansi\ansicpg1251\uc1\deff0\stshfdbch0\stshfloch37\stshfhich37\stshfbi37\deflang1049\deflangfe1049{\fonttbl{\f0\froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman{\*\falt Times New Roman};}..{\f1\fswiss\fcharset204\fprq2{\*\panose 020b0604020202020204}Arial;}{\f2\fmodern\fcharset204\fprq1{\*\panose 02070309020205020404}Courier New;}{\f3\froman\fcharset2\fprq2{\*\panose 05050102010706020507}Symbol;}..{\f10\fnil\fcharset2\fprq2{\*\panose 05000000000000000000}Wingdings;}{\f37\fswiss\fcharset204\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f211\froman\fcharset0\fprq2 Times New Roman{\*\falt Times New Roman};}..{\f209\froman\fcharset238\fprq2 Times New Roman CE{\*\falt Times New Roman};}{\f212\froman\fcharset161\fprq2 Times New Roman Greek{\*\falt Times New Roman};}{\f213\froman\fcharset162\fprq2 Times New Roman Tur{\*\falt Times New Roman};}..{\f214\froman\fcharset177\fprq2 Times New Roman (Hebrew){\*\falt Times New Roman};}{\f215\froman\fcharset178\fprq2 Time
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):89220
                                                                                Entropy (8bit):3.469297258214741
                                                                                Encrypted:false
                                                                                SSDEEP:768:YvozCzKUNNfMnuQhgdXT0Z2BPshK+4aCWpQJ3OEInKDcbztlXnpQbbMv3PI:Yvoz4TXTI2pQCWOJvgXnpQbS3PI
                                                                                MD5:B1C96EF24061BF294CAC6C4C9CBF7757
                                                                                SHA1:5D1B1934091E257B5F1C69B13F5FC1E424348584
                                                                                SHA-256:20DB884523DA62C20F80B8A3BB71E11091B90A443B83C06D8FE2A1BBC00C1C33
                                                                                SHA-512:6E90562FD804F91DDADEF2310551063D34B859FF1CC6E58A41667E9CDA062DCA851C8455882EF47CF3E1A8EC21EBD9F0761F15E54174CC4A95427238CB39BA14
                                                                                Malicious:false
                                                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.3.3.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .Q.u.e.s.t.i.o.n.....e.r.r.o.r. .=. .E.r.r.o.r.....i.n.f.o.r.m.a.t.i.o.n. .=. .I.n.f.o.r.m.a.t.i.o.n.....n.o.t.i.f.i.c.a.t.i.o.n. .=. .N.o.t.i.f.i.c.a.t.i.o.n.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .C.a.n. .n.o.t. .r.e.a.d. .s.e.r.v.i.c.e. .c.o.n.f.i.g.u.r.a.t.i.o.n...\.n.;.R.e.i.n.s.t.a.l.l. .L.i.t.e.M.a.n.a.g.e.r. .s.e.r.v.i.c.e.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .C.a.n. .n.o.t. .s.e.t. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r. .s.e.r.v.i.c.e. .s.t.a.r.t.u.p. .m.o.d.e.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .C.a.n. .n.o.t. .s.e.t. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r. .s.e.r.v.i.c.e. .s.t.a.r.t.u.p. .m.o.d.e...\.n.;.R.e.b.o.o.t. .s.y.s.t.e.m.,. .p.l.e.a.s.e.......
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):201728
                                                                                Entropy (8bit):6.3607488106285075
                                                                                Encrypted:false
                                                                                SSDEEP:3072:rmqdVRkbN1G3OKtVLqKc3IuQquARCASmShKJ:rmyTmNw3zqKcFLRs
                                                                                MD5:1D4F8CFC7BBF374CCC3AAE6045B2133D
                                                                                SHA1:802EDF0B0ED1D0305BCD6688EE3301366FEC1337
                                                                                SHA-256:C04885562F17BAEEFBCD2D4FC29F054EB8A66C44BD015750498C69A912D94C1F
                                                                                SHA-512:68643A30FEA87B2B61AF546F42BF32A25459152C1BCCE5A8A881714139CE828DFE4237874FF1E9CC3B78D6CDBEF7DD45C9F3459C3337D83693C704C274AFFF3E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: gBYz86HSwI.msi, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 0438.pdf.exe, Detection: malicious, Browse
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...|..[.................\...........v............@.................................................................. ...................@...................@...G..................................................$................................text....S.......T.................. ..`.itext..D....p.......X.............. ..`.data...<............`..............@....bss....<Y...............................idata...............z..............@....didata.............................@....edata....... ......................@..@.rdata..E....0......................@..@.reloc...G...@...H..................@..B.rsrc....@.......@..................@..@....................................@..@........................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):61034
                                                                                Entropy (8bit):4.429529654892776
                                                                                Encrypted:false
                                                                                SSDEEP:768:nebbtdP4XFsh6HWiIZTYp7JtMLG54ttg2kGPyWtvQTznCKDMlV2f:ne3KOhTTocL8HnMlV2f
                                                                                MD5:7303B5AE0B8911CEB238DC01419695BE
                                                                                SHA1:22B89BDB8FAEC62BA3E66639E38E6271B593944A
                                                                                SHA-256:88155FB3F0E198AA4A24F9CFECBB83C5A4E081C6EA362BC50294410CB2FB5C50
                                                                                SHA-512:8AE802616AF60BAF214E254F6A55D312DC46B6E3F8BEE5F50E30E372FF38103776278B5FB07A562C2149EEA58107CB427A03B1629F72044AB69D3507E5DFAB15
                                                                                Malicious:false
                                                                                Preview:[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.2.8.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .OUL.....e.r.r.o.r. .=. ./.......i.n.f.o.r.m.a.t.i.o.n. .=. ........n.o.t.i.f.i.c.a.t.i.o.n. .=. ....w....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .!q.l...S.g.RD}Ka.0\.n.;...e.[. .L.i.t.e.M.a.n.a.g.e.r. ..g.R?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .!q.l-..[ .L.i.t.e.M.a.n.a.g.e.r. .:O.ghV.g.R_U.R!j._.0....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .!q.l-..[ .L.i.t.e.M.a.n.a.g.e.r. .:O.ghV.g.R_U.R!j._.0\.n.;....e.._j.|q}.0....f.m._.s.e.t.t.i.n.g.s._.r.e.s.t.a.r.t._.s.e.r.v.i.c.e._.t.o._.a.p.p.l.y. .=. ....e_U.R .L.M. .:O.ghV.a(u.z._.NWY(u...f.0....f.m._.s.e.c.u.r.i.t.y._.f.o.r.c.e._.g.u.e.s.t. .=. .7_6R.O.(Wdk.|q}.N-..[.....asTW.@b.g.}..O(u.....S.g.O.X[.S.kP..0 .!q.l.O(u.07_
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):58794
                                                                                Entropy (8bit):3.642324420313977
                                                                                Encrypted:false
                                                                                SSDEEP:768:D+XPobz4qFlRiiXc0HwgHSSxnrKT7nke7GShFBy/x97fuTLY57aC7I/Fj:yPQMw1ZOT7kef1y/X7fuTq4j
                                                                                MD5:606DC375E898D7221CCB7CEB8F7C686B
                                                                                SHA1:26DCF93876C89283623B8150C1B79EDB24B6A7EC
                                                                                SHA-256:F442E440580EA35040E35BF1D85A118E7C182FDE0B9BA2A3C1816DEAB5F822BB
                                                                                SHA-512:9FBC42165B51A2020D2DA2FFE33287A4F3AA33639126813B290D329D47C4F4DA8F297A47AF3C1F63AF6F9E1BA47ACE840BC1660D603E17589E5DB6DDA0E1E5B1
                                                                                Malicious:false
                                                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.5.5.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...c.o.m./.....q.u.e.s.t.i.o.n. .=. .S.o.r.u.....e.r.r.o.r. .=. .H.a.t.a.....i.n.f.o.r.m.a.t.i.o.n. .=. .B.i.l.g.i.....n.o.t.i.f.i.c.a.t.i.o.n. .=. .B.i.l.d.i.r.i.m.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. .H.i.z.m.e.t. .y.a.p.1.l.a.n.d.1.r.m.a.s.1. .o.k.u.n.a.m.1.y.o.r...\.n.;.L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t.i.n.i. .y.e.n.i.d.e.n. .y...k.l.e.m.e.k. .m.i. .i.s.t.i.y.o.r.s.u.n.u.z.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. .L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t. .b.a._.l.a.n.g.1... .m.o.d.u.n.u. .a.y.a.r.l.a.y.a.m.1.y.o.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. .L.i.t.e.M.a.n.a.g.e.r. .h.i.z.m.e.t. .b.a._.l.a.n.g.1... .m.o.d.u.n.u. .a.y.a.r.l.a.y.a.m.1.y.o.r...\.n.;.S.i.s.t.e.m.i. .y.e.n.i.d.e.n. .b.a._.l.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with very long lines (305), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):87912
                                                                                Entropy (8bit):4.303374267443204
                                                                                Encrypted:false
                                                                                SSDEEP:768:VUlHxa/yEOYEJNHWjlUu1pZ26ER2nkUTbfk74Q:aNxWREb4lUu1P29R2JbfC4Q
                                                                                MD5:3FC082E8F516EAD9FC26AC01E737F9EF
                                                                                SHA1:3B67EBCE4400DDCF6B228E5668F3008561FB8F21
                                                                                SHA-256:3DC0CEAE11F445B57B17B7C35A90B5133E313CF6B61550AB418252C5B8089C99
                                                                                SHA-512:9A9D20AF2F8C27056F58AB5A9C687F5124CE5F6D563E396C9558331FB8BE48E88E148B1FDC548A5EBDEDB451E3D89F2F96856F3BBFD695691D5687599F376421
                                                                                Malicious:false
                                                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d. .=. .1.0.5.8.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...r.u./.....q.u.e.s.t.i.o.n. .=. ...8.B.0.=.=.O.....e.r.r.o.r. .=. ...>.<.8.;.:.0.....i.n.f.o.r.m.a.t.i.o.n. .=. ...=.D.>.@.<.0.F.V.O.....n.o.t.i.f.i.c.a.t.i.o.n. .=. ...>.2.V.4.>.<.;.5.=.=.O.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. ...5.<.>.6.;.8.2.>. .?.@.>.G.8.B.0.B.8. .:.>.=.D.V.3.C.@.0.F.V.N. .A.;.C.6.1.8...\.n.;...5.@.5.2.A.B.0.=.>.2.8.B.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. ...5.<.>.6.;.8.2.>. .2.A.B.0.=.>.2.8.B.8. .@.5.6.8.<. .7.0.?.C.A.:.C. .A.;.C.6.1.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. ...5.<.>.6.;.8.2.>. .2.A.B.0.=.>.2.8.B.8. .@.5.6.8.<. .7.0.?.C.A.:.C. .A.;.C.6.1.8. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):6307408
                                                                                Entropy (8bit):6.5944937257467116
                                                                                Encrypted:false
                                                                                SSDEEP:98304:NwiA/GmKEt3LQ7V8z3uHWkd49GMdqOxaB:NOGmKEt31kd2dqwaB
                                                                                MD5:63D0964168B927D00064AA684E79A300
                                                                                SHA1:B4B9B0E3D92E8A3CBE0A95221B5512DED14EFB64
                                                                                SHA-256:33D1A34FEC88CE59BEB756F5A274FF451CAF171A755AAE12B047E678929E8023
                                                                                SHA-512:894D8A25E9DB3165E0DAAE521F36BBD6F9575D4F46A2597D13DEC8612705634EFEA636A3C4165BA1F7CA3CDC4DC7D4542D0EA9987DE10D2BC5A6ED9D6E05AECB
                                                                                Malicious:false
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f..................C..F........C.......C...@.......................... i.......`..........@................... N.......M..A...@T...............`.P"...PN.<............................@N.......................M.......N......................text.....C.......C................. ..`.itext...0....C..2....C............. ..`.data... 3....C..4....C.............@....bss........0E..........................idata...A....M..B....E.............@....didata.......N......LE.............@....edata....... N......ZE.............@..@.tls....X....0N..........................rdata..]....@N......\E.............@..@.reloc..<....PN......^E.............@..B.rsrc........@T......DK.............@..@............. i.......`.............@..@................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):7753808
                                                                                Entropy (8bit):6.615075046955521
                                                                                Encrypted:false
                                                                                SSDEEP:98304:D4/WZQ7lc63BJGS1VFeIEll251o7+YcMBk2VVyN/RTfCAFIqOx9N:DXQ7SIEXeMBk2V4N/Nq2Iqw9N
                                                                                MD5:F3D74B072B9697CF64B0B8445FDC8128
                                                                                SHA1:8408DA5AF9F257D12A8B8C93914614E9E725F54C
                                                                                SHA-256:70186F0710D1402371CE2E6194B03D8A153443CEA5DDB9FC57E7433CCE96AE02
                                                                                SHA-512:004054EF8CDB9E2FEFC3B7783574BFF57D6D5BF9A4624AD88CB7ECCAE29D4DFD2240A0DC60A14480E6722657132082332A3EC3A7C49D37437644A31E59F551AF
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...w#.f.................ZU... ......qU.......U...@.......................... ........v..........@...................._......`_..K....g.. ............v.P"...._.4............................._..................... m_.|....._......................text....&U......(U................. ..`.itext..$1...@U..2...,U............. ..`.data....@....U..B...^U.............@....bss....0.....V..........................idata...K...`_..L....V.............@....didata......._.......V.............@....edata........_.......V.............@..@.tls....`....._..........................rdata..]....._.......V.............@..@.reloc..4....._.......V.............@..B.rsrc.... ....g.. ....^.............@..@............. ........v.............@..@................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):999944
                                                                                Entropy (8bit):6.626732213066839
                                                                                Encrypted:false
                                                                                SSDEEP:12288:SA9+TVJdg0YMgqAahyv0jKdTq4lrBhqSq/rt8VwGFrt:SRho0lgqA6yvnrBhq/rQDt
                                                                                MD5:ED32E23322D816C3FE2FC3D05972689E
                                                                                SHA1:5EEA702C9F2AC0A1AADAE25B09E7983DA8C82344
                                                                                SHA-256:7F33398B98E225F56CD287060BEFF6773ABB92404AFC21436B0A20124919FE05
                                                                                SHA-512:E505265DD9D88B3199EB0D4B7D8B81B2F4577FABD4271B3C286366F3C1A58479B4DC40CCB8F0045C7CD08FD8BF198029345EEF9D2D2407306B73E5957AD59EDF
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...`.-\.................J...........X.......`....@.................................................................. ...................@...........0.......@.. O...................................................................................text...0?.......@.................. ..`.itext..8....P.......D.............. ..`.data....:...`...<...N..............@....bss.....]...............................idata..............................@....didata.............................@....edata....... ......................@..@.rdata..E....0......................@..@.reloc.. O...@...P..................@..B.rsrc....@.......@..................@..@.....................0..............@..@........................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):94772
                                                                                Entropy (8bit):4.284840986247552
                                                                                Encrypted:false
                                                                                SSDEEP:768:r1kyTyZFOTb6QeZGJXYbFAMrKARuZk7FRwZoFTa2n:rn+2iZGhYbK4KARpAoFTa2n
                                                                                MD5:0E204FABE68B4B65ED5E0834651FB732
                                                                                SHA1:B338A6E54AA18F3F8A573580520F16C74A51F3D2
                                                                                SHA-256:302373D81F0AE15589206420CB01A266804C9FD1C1FF0D6E09CE6BA3FEF92B64
                                                                                SHA-512:AAD76F6A76DC693D959389CE471BC585D0DA72737FED99F42F219FDC7C71617C00E8003A467092E12820A359D672C6FB80D99772F3F6433923B2ABB7EEA40F08
                                                                                Malicious:false
                                                                                Preview:..[._.s.y.s.t.e.m.].....l.a.n.g.u.a.g.e._.i.d.=.1.0.4.9.........[._.m.e.s.s.a.g.e.s.].....w.e.b._.s.i.t.e. .=. .h.t.t.p.:././.l.i.t.e.m.a.n.a.g.e.r...r.u./.....q.u.e.s.t.i.o.n. .=. ...>.?.@.>.A.....e.r.r.o.r. .=. ...H.8.1.:.0.....i.n.f.o.r.m.a.t.i.o.n. .=. ...=.D.>.@.<.0.F.8.O.....n.o.t.i.f.i.c.a.t.i.o.n. .=. ...?.>.2.5.I.5.=.8.5.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.r.e.a.d._.c.o.n.f.i.g.u.r.a.t.i.o.n. .=. ...5.2.>.7.<.>.6.=.>. .?.@.>.G.8.B.0.B.L. .:.>.=.D.8.3.C.@.0.F.8.N. .A.;.C.6.1.K...\.n.;...5.@.5.C.A.B.0.=.>.2.8.B.L. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.?.....f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e. .=. ...5.2.>.7.<.>.6.=.>. .C.A.B.0.=.>.2.8.B.L. .@.5.6.8.<. .7.0.?.C.A.:.0. .A.;.C.6.1.K. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r.......f.m._.s.e.t.t.i.n.g.s._.u.n.a.b.l.e._.s.e.t._.s.t.a.r.t.u.p._.m.o.d.e._.r.e.s.t.a.r.t. .=. ...5.2.>.7.<.>.6.=.>. .C.A.B.0.=.>.2.8.B.L. .@.5.6.8.<. .7.0.?.C.A.:.0. .A.;.C.6.1.K. .L.i.t.e.M.a.n.a.g.e.r. .S.e.r.v.e.r...\.n.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):7752272
                                                                                Entropy (8bit):6.615186281886958
                                                                                Encrypted:false
                                                                                SSDEEP:98304:y4/WZQ7lc63BJGS1VFeIEll251o7+YcMBk2VVyN/RTfCEFIqOxJn:yXQ7SIEXeMBk2V4N/NqiIqwJn
                                                                                MD5:84FB34E529BEDE393A3F604EAA8137B2
                                                                                SHA1:195EA03B7BD086454A13C0D8357E0A9E447D9EC9
                                                                                SHA-256:1E396C4066AC8F421A54893442A0D76C4F8D4146E63825D67DFC0DA782E73EE5
                                                                                SHA-512:A48A80D62E588667B4C891CDED279BABFFA5FB4FDF092F345212F81D29A9ACAA06E6DB27B49DC601909409A3C82AA9272BCDF90D0AE1738E83E80D9FCA4D93E6
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f.................ZU... ......qU.......U...@.......................... ........v..........@...................._......`_..K....g..............(v.P"...._.4............................._..................... m_.|....._......................text....&U......(U................. ..`.itext..$1...@U..2...,U............. ..`.data....@....U..B...^U.............@....bss....0.....V..........................idata...K...`_..L....V.............@....didata......._.......V.............@....edata........_.......V.............@..@.tls....`....._..........................rdata..]....._.......V.............@..@.reloc..4....._.......V.............@..B.rsrc.........g.......^.............@..@............. .......(v.............@..@................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):11361360
                                                                                Entropy (8bit):6.496049600782297
                                                                                Encrypted:false
                                                                                SSDEEP:98304:AshiRp5hPI7N9sSA5wbZXJOu/0uOXZYfmQYanSjS+cWuNOlQpgfYLyPsd+QgBBP5:Al5hPwgvyAjDjS+igfgym+bHJxmK
                                                                                MD5:B0E355EC3453C8FFAEE08CD4257E96F2
                                                                                SHA1:0FA023CA8F1C1ECDADDE3DD3BD551870C2D965E2
                                                                                SHA-256:60248BA026064B116E4F94020DABB74DF519F5B4C41379CA19A38D725692CA8E
                                                                                SHA-512:B6004F83FD78EED84BF21611EFA45F2FFADF3625E0A2FDCDAE531B4734A4B886EBFE5EBE990DA42302B7368282D83DFFEF19E71DA8EC4C155EE5C8619AD028DD
                                                                                Malicious:false
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 3%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......f..................v..67.......v...... v...@..........................0...................@...................p...........L...p....+..........:..P"...................................................................`.......................text.....u.......u................. ..`.itext...6....u..8....u............. ..`.data....R... v..T....v.............@....bss.........w..........................idata...L.......N...Xw.............@....didata......`........w.............@....edata.......p........w.............@..@.tls....`................................rdata..].............w.............@..@.reloc................w.............@..B.rsrc.....+..p....+.................@..@.............0.......:..............@..@................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 22 18:41:10 2024, mtime=Wed Dec 25 15:23:01 2024, atime=Thu Aug 22 18:41:10 2024, length=7753808, window=hide
                                                                                Category:dropped
                                                                                Size (bytes):2098
                                                                                Entropy (8bit):3.820083871559473
                                                                                Encrypted:false
                                                                                SSDEEP:48:8VdOKFouL1Zd5Y+d5YsP5qoZkmrSUp8JWqoZkmReiN:8nFo19O5qoZbcJWqoZbReiN
                                                                                MD5:DB4C0E72AFE3336686E7B6E36A2DF495
                                                                                SHA1:922A01893CAFE2965A277E4C395753427D6C469D
                                                                                SHA-256:B26124C140F3F79C4912BFE181B74D56808BDEC10D715F12F76B5194E1A2938B
                                                                                SHA-512:05F7ABDAC7698867C9F99D857696D9F6059D83F71AD8C627CD662A198FB6A8A54A02BDBFB60F8E26642B4584846DDE1439B7A8C85F016B76E3BA095C3421AA7D
                                                                                Malicious:false
                                                                                Preview:L..................F.@.. ......=......VD.V.....=....PPv..........................P.O. .:i.....+00.../C:\.....................1......Y....PROGRA~2..|.......:...Y..*...................R.....P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....v.1......Y...LITEMA~1..^......Y...Y.*.........................L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.....d.2.PPv..Y%. .ROMSER~1.EXE..H.......Y%..Y.*.........................R.O.M.S.e.r.v.e.r...e.x.e.......l...............-.......k...........h. .....C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe..L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.c.o.n.f.i.g.n.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.c.o.n.f.i.g
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                Category:dropped
                                                                                Size (bytes):1878
                                                                                Entropy (8bit):3.180022631061714
                                                                                Encrypted:false
                                                                                SSDEEP:24:8NqdOeK5Jd5Yc/d5YcCP+MTyjvKDDTEVS7ky/4WTyjvKDDTEcUGxy:8wdOn5Jd5Y+d5YcCP5q2DT2S0Wq2DTM
                                                                                MD5:4FA9A649BCBCCE9B0F6FF515284D9F58
                                                                                SHA1:7B3B20DF66298B4FCC3D64B5FFF300340490109B
                                                                                SHA-256:B9169D8C1ABD09A3EB683FB03AF3E43CA5D23B11CDE85B351B6B35AE90B98F79
                                                                                SHA-512:49531CB7ED725193D56178A98E27887AF22C6056B3C452D34BEAEDFA037D40288A5F7FFC49C13B8BE30A05D2EF206007354589011EF077F27B77F650BED66CD4
                                                                                Malicious:false
                                                                                Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................v.1...........Program Files (x86).T..............*.........................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)..."...1...........LiteManager Pro - Server..^..............*.........................L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r...(.d.2...........ROMServer.exe.H..............*.........................R.O.M.S.e.r.v.e.r...e.x.e.......L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.s.t.a.r.t.n.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.R.O.M.S.e.r.v.e.r...e.x.e._.9.D.0.9.B.2.B.C.2.5.A.2.4.1.4.C.B.D.8.4.8.E.2.B.7.5.8.9.8.6.7.6...e.x.e.........%SystemRoot%\Installer\{71F
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 22 18:41:10 2024, mtime=Wed Dec 25 15:23:01 2024, atime=Thu Aug 22 18:41:10 2024, length=7753808, window=hide
                                                                                Category:dropped
                                                                                Size (bytes):2090
                                                                                Entropy (8bit):3.8053286915620177
                                                                                Encrypted:false
                                                                                SSDEEP:48:8VdOKFouL1Zd5Y+d5Ys5qcxFWT84SslWqcxFWT84eiN:8nFo19s5qcxYT8SWqcxYT84eiN
                                                                                MD5:A66A49FB4A4CACF432F24E3C8F098DB9
                                                                                SHA1:DF3DA65A0F6C85669CD689BD134D4C438CE84EC7
                                                                                SHA-256:A54983B5EB4C34A71DDE5659647EACDFCF190113F09576337121E573A27BC921
                                                                                SHA-512:D6DC84B4DFCF3E78BA4DA326AE607D176941F737D6CECDCF20353CE68EB367BF6EDF7F2F2B5A9E72719A60B5AD60995E3F04826245111300B130083F695DD897
                                                                                Malicious:false
                                                                                Preview:L..................F.@.. ......=......VD.V.....=....PPv..........................P.O. .:i.....+00.../C:\.....................1......Y....PROGRA~2..|.......:...Y..*...................R.....P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....v.1......Y...LITEMA~1..^......Y...Y.*.........................L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.....d.2.PPv..Y%. .ROMSER~1.EXE..H.......Y%..Y.*.........................R.O.M.S.e.r.v.e.r...e.x.e.......l...............-.......k...........h. .....C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe..L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.R.O.M.S.e.r.v.e.r...e.x.e.0.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.i.t.e.M.a.n.a.g.e.r. .P.r.o. .-. .S.e.r.v.e.r.\.../.s.t.o.p.l.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.s.t.o.p._.s.e.r
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Thu Mar 23 15:18:06 2017, mtime=Thu Mar 23 15:18:06 2017, atime=Thu Mar 23 15:18:06 2017, length=73216, window=hide
                                                                                Category:dropped
                                                                                Size (bytes):1884
                                                                                Entropy (8bit):3.7618004829144374
                                                                                Encrypted:false
                                                                                SSDEEP:24:8WiikpqQVmG9iNA3wB+sHyjv/+MTyjvejIKZDUHwGS7ke4WTyjvejIKZDUHwI6yv:8W5kVz9iGeHOn5qmjlt6ScWqmjltf9u
                                                                                MD5:019789AF7244A0D78893838705EF5396
                                                                                SHA1:DF14B7F7CA74870EE89AF734F40F20A0025AE376
                                                                                SHA-256:04BE6C6CA6EE5510170C0D550DF7B19944F1AD6DE79D2A95A477977A3B074445
                                                                                SHA-512:C1F1EB8592674D2F958225CDB57F0956F3DD3E3A27FC463232C4407BE1B79315E01A2B1ACDBA5EEA52E09538E52EC1515CA61BEF967431146697B94C57421F62
                                                                                Malicious:false
                                                                                Preview:L..................F.@.. ....:......:......:.............................5....P.O. .:i.....+00.../C:\...................R.1......WG...Windows.<.......:...WG.*...p.....................W.i.n.d.o.w.s.....V.1......Y...SysWOW64..>.......:...Y.*...".....................S.y.s.W.O.W.6.4.....^.2.....wJD. .msiexec.exe.D......wJD.wJD.*....[....................m.s.i.e.x.e.c...e.x.e.......N...............-.......M...........h. .....C:\Windows\SysWOW64\msiexec.exe........\.....\.....\.....\.....\.....\.W.i.n.d.o.w.s.\.S.y.s.W.O.W.6.4.\.m.s.i.e.x.e.c...e.x.e.)./.x. .{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.s.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.1.F.F.A.4.7.5.-.2.4.D.5.-.4.4.F.B.-.A.5.1.F.-.3.9.B.6.9.9.E.3.D.8.2.C.}.\.U.N.I.N.S.T._.U.n.i.n.s.t.a.l.l._.L._.7.8.A.A.5.B.6.6.6.2.5.1.4.D.9.4.A.8.4.7.D.6.C.6.0.3.A.F.0.8.9.5...e.x.e.........%SystemRoot%\Installer\{71FFA475-24D5-44FB-A51F-39B699E3D82C}\UNINST_Uninstall_L_78AA5B6662514D94A847D6C603AF0895.exe
                                                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:modified
                                                                                Size (bytes):292
                                                                                Entropy (8bit):5.209766714927152
                                                                                Encrypted:false
                                                                                SSDEEP:6:9Qyq2PP2nKuAl9OmbnIFUt8/G1Zmw+QeQRkwOP2nKuAl9OmbjLJ:3vWHAahFUt8O1/+QJ57HAaSJ
                                                                                MD5:6A77C0A4208C297C5FF557D1362EA798
                                                                                SHA1:8B7BD43F947B52F3322F517C0C93474505C3D70A
                                                                                SHA-256:B57CBEF6A480F83067A43E3D25949D20D48DA06A0BAF2A5EE466BC1C0B4A5B9C
                                                                                SHA-512:6CC90E55A870878527D9DCD5EA330BD78DE4F08270F5F0B47DDC92174DF709A767885292EDEB4F72C4EBF95914DC7A607B68B612A8A202D6D9621DA0AECCFC6F
                                                                                Malicious:false
                                                                                Preview:2024/12/25-11:23:07.724 4076 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/25-11:23:07.727 4076 Recovering log #3.2024/12/25-11:23:07.729 4076 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):292
                                                                                Entropy (8bit):5.209766714927152
                                                                                Encrypted:false
                                                                                SSDEEP:6:9Qyq2PP2nKuAl9OmbnIFUt8/G1Zmw+QeQRkwOP2nKuAl9OmbjLJ:3vWHAahFUt8O1/+QJ57HAaSJ
                                                                                MD5:6A77C0A4208C297C5FF557D1362EA798
                                                                                SHA1:8B7BD43F947B52F3322F517C0C93474505C3D70A
                                                                                SHA-256:B57CBEF6A480F83067A43E3D25949D20D48DA06A0BAF2A5EE466BC1C0B4A5B9C
                                                                                SHA-512:6CC90E55A870878527D9DCD5EA330BD78DE4F08270F5F0B47DDC92174DF709A767885292EDEB4F72C4EBF95914DC7A607B68B612A8A202D6D9621DA0AECCFC6F
                                                                                Malicious:false
                                                                                Preview:2024/12/25-11:23:07.724 4076 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/25-11:23:07.727 4076 Recovering log #3.2024/12/25-11:23:07.729 4076 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                File Type:ASCII text
                                                                                Category:dropped
                                                                                Size (bytes):292
                                                                                Entropy (8bit):5.209766714927152
                                                                                Encrypted:false
                                                                                SSDEEP:6:9Qyq2PP2nKuAl9OmbnIFUt8/G1Zmw+QeQRkwOP2nKuAl9OmbjLJ:3vWHAahFUt8O1/+QJ57HAaSJ
                                                                                MD5:6A77C0A4208C297C5FF557D1362EA798
                                                                                SHA1:8B7BD43F947B52F3322F517C0C93474505C3D70A
                                                                                SHA-256:B57CBEF6A480F83067A43E3D25949D20D48DA06A0BAF2A5EE466BC1C0B4A5B9C
                                                                                SHA-512:6CC90E55A870878527D9DCD5EA330BD78DE4F08270F5F0B47DDC92174DF709A767885292EDEB4F72C4EBF95914DC7A607B68B612A8A202D6D9621DA0AECCFC6F
                                                                                Malicious:false
                                                                                Preview:2024/12/25-11:23:07.724 4076 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/25-11:23:07.727 4076 Recovering log #3.2024/12/25-11:23:07.729 4076 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):131072
                                                                                Entropy (8bit):0.008898238653846898
                                                                                Encrypted:false
                                                                                SSDEEP:3:ImtVnM1xVlt/rt/l3Sxdlt4dV1gt/lop:IiV0xlzaxdX4m1lo
                                                                                MD5:3B8BF2F369CA7ABDF0636EE15DDEF161
                                                                                SHA1:4B82D483B79B555C62AA17F31F24F43C38F2C80F
                                                                                SHA-256:100201408FDCFA835C8699C6C2FCE748C5C3844C386053F9AA7CAD622373BFCA
                                                                                SHA-512:457D92EA15FA528E7BE3ED8136A267BD08A4D7866FDD7C353CFEB898F896983B40BB48156DC25D5E00EC118C6309337F3A9344226D1635F94D7F4A122D3DD87E
                                                                                Malicious:false
                                                                                Preview:VLnk.....?......LhXJ ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
                                                                                Category:dropped
                                                                                Size (bytes):65110
                                                                                Entropy (8bit):1.3323487663569655
                                                                                Encrypted:false
                                                                                SSDEEP:96:EA/2SxICG/fi6vB/2TxVCG/di6vB/2TxVCG/di6vB/2TxVCG/di6vB/2TxVCG/dn:a2sZElTElTElTElTElTElTElTEll
                                                                                MD5:428B72B9BFDB6192E56742AABD9F9639
                                                                                SHA1:BB66319303FCC7139F072BDA29268AC76645744B
                                                                                SHA-256:27E97FA50AB918372CE9A9D910F38B3F65ED3E13EB45CA2FD41E3202B8C6A499
                                                                                SHA-512:B14AE9EB0A304510B5C192F4B4DED451B9238800C62BD370E4947CD737D510157FBB1EB183E515B7D129AD75C4E6593DA6A51A52DC01DBC6F7B404C77CC6850D
                                                                                Malicious:false
                                                                                Preview:BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
                                                                                Category:dropped
                                                                                Size (bytes):65110
                                                                                Entropy (8bit):1.3323487663569655
                                                                                Encrypted:false
                                                                                SSDEEP:96:EA/2SxICG/fi6vB/2TxVCG/di6vB/2TxVCG/di6vB/2TxVCG/di6vB/2TxVCG/dn:a2sZElTElTElTElTElTElTElTEll
                                                                                MD5:428B72B9BFDB6192E56742AABD9F9639
                                                                                SHA1:BB66319303FCC7139F072BDA29268AC76645744B
                                                                                SHA-256:27E97FA50AB918372CE9A9D910F38B3F65ED3E13EB45CA2FD41E3202B8C6A499
                                                                                SHA-512:B14AE9EB0A304510B5C192F4B4DED451B9238800C62BD370E4947CD737D510157FBB1EB183E515B7D129AD75C4E6593DA6A51A52DC01DBC6F7B404C77CC6850D
                                                                                Malicious:false
                                                                                Preview:BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):72643
                                                                                Entropy (8bit):5.393779678652009
                                                                                Encrypted:false
                                                                                SSDEEP:768:PCbTjMYOpdyVFWqnPvBRSiRkTIVzY3BC2U5KYDWXUHYyu:AlOpdyVFWcPvBBRkTIdY3qeUHK
                                                                                MD5:C3A4BBBE00F7179CE1D39073F1E1EE79
                                                                                SHA1:7433B3FF06E6526AE45A32FC56D686C8151466A5
                                                                                SHA-256:220BE321F3786316CA2B2DDB64CBD53A8F40A281E5888BCBCEF5FB6CA6076163
                                                                                SHA-512:57E9D8D3642893BE538FDE60EAD48A864EF71A7BB3B685B9572EBFBB72BA7AE29BF099D88FEEB6E172374490021A7FA31A0E2D6E1867FBF33F9C8A27AB674971
                                                                                Malicious:false
                                                                                Preview:4.458.88.FID.2:o:........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.94.FID.2:o:........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.82.FID.2:o:........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.85.FID.2:o:........:F:Aparajita.P:Aparajita.L:&.........................."F:Aparajita.#.99.FID.2:o:........:F:Aparajita-Italic.P:Aparajita Italic.L:&.........................."F:Aparajita.#.95.FID.2:o:........:F:Aparajita-Bold.P:Aparajita Bold.L:&.........................."F:Aparajita.#.108.FID.2:o:........:F:Aparajita-BoldItalic.P:Aparajita Bold Italic.L:&.........................."F:Aparajita.#.93.FID.2:o:........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.75.FID.2:o:........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.89.FID.2:o:........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.85.FID.2:o:........:F:Arial-BoldMT.P:Arial Bold.L:$....
                                                                                Process:C:\Users\user\Desktop\0442.pdf.exe
                                                                                File Type:PDF document, version 1.7, 6 pages
                                                                                Category:dropped
                                                                                Size (bytes):85137
                                                                                Entropy (8bit):7.7513343990244366
                                                                                Encrypted:false
                                                                                SSDEEP:1536:eyetDLuxUTpyWbzUGW7EmvP95imdqYKq6i97idLfnk:eyetMk1tCPfimdsq6ididL8
                                                                                MD5:17A9D7D59ED8076A38B9E48533A01A10
                                                                                SHA1:1EC63D0BECCCBCE15277A3C227E787131C1E8F74
                                                                                SHA-256:631C4D8C4D0DE76F18712484358E532BE32F2FA2F92D7FAB026406C346ACBCDA
                                                                                SHA-512:E3C8AD153864482AC0BDE7445DAFFF1DAC9DCBC48D83C99169388C2EEE832EDDB02B4A2553F60D81E93674F76880544F4C10F05098830E7931518D14DF1DCFED
                                                                                Malicious:false
                                                                                Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(ru) /StructTreeRoot 37 0 R/MarkInfo<</Marked true>>/Metadata 351 0 R/ViewerPreferences 352 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 6/Kids[ 3 0 R 26 0 R 28 0 R 30 0 R 32 0 R 34 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 12 0 R/F3 14 0 R/F4 19 0 R/F5 24 0 R>>/ExtGState<</GS10 10 0 R/GS11 11 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 595.32 841.92] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 1237>>..stream..x..Ko.6.....w.1)`...C.....Z4...r.z.!..F....J...).+.`.k...>....o4....._........V..<>.7_..>.=.T.6....h3...A.e+..U`...o_..O?.......{P....m..>m..`5..g......{w.F=......!L.w.....6.iLK.._..O.]...a.S..F...I....~.x.nL......}.;J|..>....d..L.....=...QB[.4p^[..t.dB...!.=.......v...]h.0F.......C....5&B....Yoz.n....c[W<........'. .1.9?...m.).hG.)!Zm...:..K(I.d...\..s..%.
                                                                                Process:C:\Users\user\Desktop\0442.pdf.exe
                                                                                File Type:PDF document, version 1.7, 6 pages
                                                                                Category:dropped
                                                                                Size (bytes):85137
                                                                                Entropy (8bit):7.7513343990244366
                                                                                Encrypted:false
                                                                                SSDEEP:1536:eyetDLuxUTpyWbzUGW7EmvP95imdqYKq6i97idLfnk:eyetMk1tCPfimdsq6ididL8
                                                                                MD5:17A9D7D59ED8076A38B9E48533A01A10
                                                                                SHA1:1EC63D0BECCCBCE15277A3C227E787131C1E8F74
                                                                                SHA-256:631C4D8C4D0DE76F18712484358E532BE32F2FA2F92D7FAB026406C346ACBCDA
                                                                                SHA-512:E3C8AD153864482AC0BDE7445DAFFF1DAC9DCBC48D83C99169388C2EEE832EDDB02B4A2553F60D81E93674F76880544F4C10F05098830E7931518D14DF1DCFED
                                                                                Malicious:false
                                                                                Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(ru) /StructTreeRoot 37 0 R/MarkInfo<</Marked true>>/Metadata 351 0 R/ViewerPreferences 352 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 6/Kids[ 3 0 R 26 0 R 28 0 R 30 0 R 32 0 R 34 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 12 0 R/F3 14 0 R/F4 19 0 R/F5 24 0 R>>/ExtGState<</GS10 10 0 R/GS11 11 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 595.32 841.92] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 1237>>..stream..x..Ko.6.....w.1)`...C.....Z4...r.z.!..F....J...).+.`.k...>....o4....._........V..<>.7_..>.=.T.6....h3...A.e+..U`...o_..O?.......{P....m..>m..`5..g......{w.F=......!L.w.....6.iLK.._..O.]...a.S..F...I....~.x.nL......}.;J|..>....d..L.....=...QB[.4p^[..t.dB...!.=.......v...]h.0F.......C....5&B....Yoz.n....c[W<........'. .1.9?...m.).hG.)!Zm...:..K(I.d...\..s..%.
                                                                                Process:C:\Users\user\Desktop\0442.pdf.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                                                                Category:dropped
                                                                                Size (bytes):11553792
                                                                                Entropy (8bit):7.938196666665725
                                                                                Encrypted:false
                                                                                SSDEEP:196608:cJg0ov2gTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:CRJoLA9OIlWy58/19J+iYNPEoHg0
                                                                                MD5:B02F581793BE146506FACC3C6AEEBC32
                                                                                SHA1:DB1CB3BD3744C77E6E3253CF4480E177A358669A
                                                                                SHA-256:1666B1C2AE1AF47B252ABBC69C80281F81A7EA979F1D784FADC19ED6FEEC59F0
                                                                                SHA-512:8113F897F5936F6393746635D2BEDCEB410DBD1F825DF28C65D96EC3390509755E63E01C5311EC0A78B2FF48579D634C5D77CED80FBA01B68D2E9A08223B8E0A
                                                                                Malicious:false
                                                                                Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                Process:C:\Users\user\Desktop\0442.pdf.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):130
                                                                                Entropy (8bit):4.924404357134264
                                                                                Encrypted:false
                                                                                SSDEEP:3:mKDb2nppLJTXZkRErG+fyM1K/RFofD6ANntch9wQn:hb4ZGaH1MUmy2Nn
                                                                                MD5:AA3AAB4A5BCA1D06B08C6F5D6362A5D0
                                                                                SHA1:486D423A2B689CC119CE95DFCDC018C7B552FA24
                                                                                SHA-256:A0A569883E851B4B965088F9ED9F9FBA80803B47AC6E6DD4B07DF60435184CD4
                                                                                SHA-512:2B5F84DFB399F313D11A8BFA2F3F3338CF69711D5C7B6D86E7F876C8B64DB3A664D1E3E4A4A4B0066A6949DE4E64CBA416A40BE56461556F9216EE82DE23D913
                                                                                Malicious:false
                                                                                Preview:@echo of..ping 8.8.8.8..cls..del "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LiteManager Pro - Server\*.*" /q..cls..exit
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):0.06712149920142403
                                                                                Encrypted:false
                                                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKO0AbuJ2vWEJWM1AVky6lO:2F0i8n0itFzDHFfbe2vtJWuO
                                                                                MD5:0E8B611CF5EFD5D7F4C345B5C4E1443E
                                                                                SHA1:88A30155409C7EF376FB080774D617FCD51EEB6B
                                                                                SHA-256:1DDAF54603271883C75BDB3FB0D5D7FA324500D3ECC46649D583F73FE82FBB4D
                                                                                SHA-512:6AF62D7F4423FD2635320D0E94D40F31502581BF4CE800729F8040E6A962D4E178DDA94B8C10499FAF03C37BF914598A14B1539FD2A18B83A90958235CA131EE
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):73728
                                                                                Entropy (8bit):0.2220730764556764
                                                                                Encrypted:false
                                                                                SSDEEP:48:PHMmFSBulOd5YpRXd5YNd5YGd5YMd5YmmSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Yk:PH1FqO0Wlfxm0WlfPui
                                                                                MD5:1FA9734C1404D40F0697E565253A1BEA
                                                                                SHA1:76A3618B54267801C9A1A697F83318364882E643
                                                                                SHA-256:57DE8D1F5DE8A48AE8EC8D9E935E633A131F2382B1ABAAF58B4E1329A87B7FE5
                                                                                SHA-512:CB44C25D302C2CB86171A72771092D00EB27C5E1AC5B775C998CA6BCE7C66E2EF78EBBDEB9D1EE128B4296E8F834701F71CF0F608B537FFBFF9C4AF19740A7D5
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                                                                Category:dropped
                                                                                Size (bytes):11553792
                                                                                Entropy (8bit):7.938196666665725
                                                                                Encrypted:false
                                                                                SSDEEP:196608:cJg0ov2gTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:CRJoLA9OIlWy58/19J+iYNPEoHg0
                                                                                MD5:B02F581793BE146506FACC3C6AEEBC32
                                                                                SHA1:DB1CB3BD3744C77E6E3253CF4480E177A358669A
                                                                                SHA-256:1666B1C2AE1AF47B252ABBC69C80281F81A7EA979F1D784FADC19ED6FEEC59F0
                                                                                SHA-512:8113F897F5936F6393746635D2BEDCEB410DBD1F825DF28C65D96EC3390509755E63E01C5311EC0A78B2FF48579D634C5D77CED80FBA01B68D2E9A08223B8E0A
                                                                                Malicious:false
                                                                                Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.8139758201669216
                                                                                Encrypted:false
                                                                                SSDEEP:48:X0scDH3luGcrmSvOd5YpRXd5YNd5YGd5YMd5YP6Ad5Y4EYSBulOd5YpRXd5YNd5j:XBpNKm0WlfPuKqO0WlfIp/
                                                                                MD5:7D995251A9BE72BB3C1BFB6FF6651290
                                                                                SHA1:9F322C68B32741DD745B2EBD76BDCA3B79C47CE8
                                                                                SHA-256:3BBC6FDEE73659D25524A486ACCAE5467177F9287F08D94771C898341C84CACE
                                                                                SHA-512:04FCE2400022D140FDD5058059045B859D7ABD7C3502535C3FE1C6141DD14C54B6C6FA4AF7B879784F221DFD77DF00DA35ED50C74B1F2E7BA69FBB01C0EEEF8E
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: LiteManager - Server 5.0 installation package, Comments: This installer contains the logic and data to install LiteManager Pro - Server 5.0, Keywords: Installer,MSI,Database, Subject: LiteManager Pro - Server, Author: LiteManagerTeam, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2015 - Premier Edition with Virtualization Pack 22, Last Saved Time/Date: Thu Aug 22 15:43:08 2024, Create Time/Date: Thu Aug 22 15:43:08 2024, Last Printed: Thu Aug 22 15:43:08 2024, Revision Number: {9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}, Code page: 0, Template: Intel;0,1033,1049
                                                                                Category:dropped
                                                                                Size (bytes):11553792
                                                                                Entropy (8bit):7.938196666665725
                                                                                Encrypted:false
                                                                                SSDEEP:196608:cJg0ov2gTGOk/J1yr/A9ODMlWyFISx8/191nYHiT88o8En03yEoH8WkJDFa:CRJoLA9OIlWy58/19J+iYNPEoHg0
                                                                                MD5:B02F581793BE146506FACC3C6AEEBC32
                                                                                SHA1:DB1CB3BD3744C77E6E3253CF4480E177A358669A
                                                                                SHA-256:1666B1C2AE1AF47B252ABBC69C80281F81A7EA979F1D784FADC19ED6FEEC59F0
                                                                                SHA-512:8113F897F5936F6393746635D2BEDCEB410DBD1F825DF28C65D96EC3390509755E63E01C5311EC0A78B2FF48579D634C5D77CED80FBA01B68D2E9A08223B8E0A
                                                                                Malicious:false
                                                                                Preview:......................>...................................8........6..................}.................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........<................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...@...M...:...;...=...........?...N...A...B...C...D...E...F...G...H...I...J...O...L...N...D.......P...Q...R...S...T...Z...V...W...X...Y....X..[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):292998
                                                                                Entropy (8bit):4.840220453174735
                                                                                Encrypted:false
                                                                                SSDEEP:3072:phoy2KjcC2jcmFDX/vjcJGUjcmFDX/rjcmFDX/dZ+cNbynfj:phoy25DXmNDXLDXX+cNbynfj
                                                                                MD5:8CD85D295986B36C6A81191550181A74
                                                                                SHA1:A929626495DE327618C96F5221E9CB91DB133FAE
                                                                                SHA-256:7733FDA412E2AFA9670C9349E5E55D89F795B76D6717C41673C9030023AACFAA
                                                                                SHA-512:2544875B7965B2E30993795CA73F02545FD86D91C166B4537C4A6BF8639405119B2A259D59C80F38C1980C349C15992870372922A3077185741FE8B5B5324531
                                                                                Malicious:false
                                                                                Preview:...@IXOS.@.....@.Z.Y.@.....@.....@.....@.....@.....@......&.{71FFA475-24D5-44FB-A51F-39B699E3D82C}..LiteManager Pro - Server..ms.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{9EF586E9-112B-4AAE-B439-5B62B7A0B1DE}.....@.....@.....@.....@.......@.....@.....@.......@......LiteManager Pro - Server......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{3244CDE6-6414-4399-B0D5-424562747210}0.C:\Program Files (x86)\LiteManager Pro - Server\.@.......@.....@.....@......&.{4D4D18AA-F74D-4291-B5A9-93C3CC48B75F}5.C:\Program Files (x86)\LiteManager Pro - Server\Lang\.@.......@.....@.....@......&.{641F154A-FEEF-4FA7-B5BF-414DB1DB8390}C.C:\Program Files (x86)\LiteManager Pro - Server\files\ROMViewer.exe.@.......@.....@.....@......&.{26EAB54E-4659-47E8-86F9-4CB74F7E03BE}0.C:\Program Files (x86)\LiteManager Pro - Server\.@.......@.....@.....@......&.{596F4636-5D51-49F
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.160503860746486
                                                                                Encrypted:false
                                                                                SSDEEP:12:JSbX72FjtaAGiLIlHVRpBh/7777777777777777777777777vDHFfbe2vtJW4pOz:J6QI5V9dviGF
                                                                                MD5:C2CB671F6DA1ED5A6939E911C74C9FD0
                                                                                SHA1:D62270414E49797C17F16CC0AF932A9851DDD006
                                                                                SHA-256:14F02542AB93EB638DC66D7AAF4A11267E0738816C646EB408AC090A6E350D49
                                                                                SHA-512:A20CB814E1124166346A5EA648DE9F8AC3B86AB74C87E2FB376310C4EE92A861E1B95046AB9DB46352E1C79A1324CF534D0D57645282A5C5F2EAA3C2FF56F246
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):53248
                                                                                Entropy (8bit):4.351781833522881
                                                                                Encrypted:false
                                                                                SSDEEP:384:AvFMAyDNOdTdFCxfrwntajXjDWLi9Y+C5vy/Q1nDcZUNeLNek+vDFNe+TNy:+MAyYdTmPJbgqcnDcCNy
                                                                                MD5:CA680899D9330BEB85E6351E6DC0D27B
                                                                                SHA1:41E89E582F58FB2A4ED06FA3BF796A1DAAC5CB6C
                                                                                SHA-256:EAB5DC45781E92CD5CF953016757B1E6F2ED7A0B5A97CC0945B19A8FBC1A85F2
                                                                                SHA-512:3817BD6EC345F96631E6CBF6C8DD384ACB17D912B1EC69D959F3AA15C05226D5FE3B5E9807D42D0E63589AABCEADFBE8BD5F293D8069DF689D12498E05842286
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(........0...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....0.......@..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):57344
                                                                                Entropy (8bit):4.774504587732323
                                                                                Encrypted:false
                                                                                SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                                                                MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                                                                SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                                                                SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                                                                SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):4.31126714354722
                                                                                Encrypted:false
                                                                                SSDEEP:384:EvFMAyDNOdTdFCxfrwntajXjDWLi9Y+C5vy/Q1nDcZMwQE3vGYksuektm6yysZc8:SMAyYdTmPJbgqcnDcmwQE/RkHRRNS
                                                                                MD5:6A4AFFF2CD33613166B37A0DAB99BD41
                                                                                SHA1:FBC0F1696213B459D099A5809D79CFC01253880F
                                                                                SHA-256:53C1AE4962663E82D3AAC7C4A6CBE3D53E05D6948ADAE6391A2748396ACF98FE
                                                                                SHA-512:7B61D32E4AD38BC21E86559BFFA49A334CCB6184E595CB43F2D60A2A77C86B31D07B1A9D1F8FBE69E9AAD7E096952D765404BEBC494E73BD992642EB6B82E3A7
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...p...............P....@.........................................................................4T..(........+...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc....+.......0..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):57344
                                                                                Entropy (8bit):4.774504587732323
                                                                                Encrypted:false
                                                                                SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                                                                MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                                                                SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                                                                SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                                                                SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):57344
                                                                                Entropy (8bit):4.774504587732323
                                                                                Encrypted:false
                                                                                SSDEEP:768:SMAyYdTmPJbgqcnDcZTw0gpEeO4tZZz+0pQTk/N0:S1U81cmpjDX/N0
                                                                                MD5:5EBCB54B76FBE24FFF9D3BD74E274234
                                                                                SHA1:6CD72F044F36B7A3A79B7D77AAE59F274A66CE95
                                                                                SHA-256:504AEB909BBA186D4298AA97DCD6A09CCDD42217AF1F6210BC5EBD23B3DFCCBF
                                                                                SHA-512:5FF61D724B77B6EDC67D33B0F1EE1C3CB01F2A03251D0BE83FF10A80A99DBA08E3A0E0F985DEED6358E467B2E9B6A837E894513D1B5E68AF253C0BBDD68539D0
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L...J&uU.................@...................P....@.........................................................................4T..(.......xC...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...xC.......P..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):999944
                                                                                Entropy (8bit):6.626732213066839
                                                                                Encrypted:false
                                                                                SSDEEP:12288:SA9+TVJdg0YMgqAahyv0jKdTq4lrBhqSq/rt8VwGFrt:SRho0lgqA6yvnrBhq/rQDt
                                                                                MD5:ED32E23322D816C3FE2FC3D05972689E
                                                                                SHA1:5EEA702C9F2AC0A1AADAE25B09E7983DA8C82344
                                                                                SHA-256:7F33398B98E225F56CD287060BEFF6773ABB92404AFC21436B0A20124919FE05
                                                                                SHA-512:E505265DD9D88B3199EB0D4B7D8B81B2F4577FABD4271B3C286366F3C1A58479B4DC40CCB8F0045C7CD08FD8BF198029345EEF9D2D2407306B73E5957AD59EDF
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...`.-\.................J...........X.......`....@.................................................................. ...................@...........0.......@.. O...................................................................................text...0?.......@.................. ..`.itext..8....P.......D.............. ..`.data....:...`...<...N..............@....bss.....]...............................idata..............................@....didata.............................@....edata....... ......................@..@.rdata..E....0......................@..@.reloc.. O...@...P..................@..B.rsrc....@.......@..................@..@.....................0..............@..@........................................................
                                                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                Entropy (8bit):7.988555676370944
                                                                                TrID:
                                                                                • Win64 Executable GUI (202006/5) 92.65%
                                                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                • DOS Executable Generic (2002/1) 0.92%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:0442.pdf.exe
                                                                                File size:11'409'543 bytes
                                                                                MD5:4f6b2b9ee57c50d6c505d0cdada4803e
                                                                                SHA1:ad7dee6f1f71c4fe6299170a160592f139390e12
                                                                                SHA256:62410e8399acf7834c74012783bde3fe9ff244e048141c4a96a65bec06895f37
                                                                                SHA512:43607bd5bd78dea051340a684ad3311172adc590e5ffcd8a7c576e3f6ddba7e13750bab2a957b4d9fdec0d68b67d5391e779ee625006d00b82a65ecfc62525ce
                                                                                SSDEEP:196608:rqwdhlYLDYm+q6yU4zpDKpuLkQ9aP8F5hidaKsv7kDXFd+bIYW2LJjIeTF:Nw3Yi6yU4zpDeuREkF5PlgP+0ijIeh
                                                                                TLSH:75B6334AF79008F8E0E6F67485778425E6723D4E1338A59F57A83A2B7E773118C36722
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                                                Icon Hash:0fd88dc89ea7861b
                                                                                Entrypoint:0x140032ee0
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x140000000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:2
                                                                                File Version Major:5
                                                                                File Version Minor:2
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:2
                                                                                Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                                                Instruction
                                                                                dec eax
                                                                                sub esp, 28h
                                                                                call 00007F71FC4F2E08h
                                                                                dec eax
                                                                                add esp, 28h
                                                                                jmp 00007F71FC4F279Fh
                                                                                int3
                                                                                int3
                                                                                dec eax
                                                                                mov eax, esp
                                                                                dec eax
                                                                                mov dword ptr [eax+08h], ebx
                                                                                dec eax
                                                                                mov dword ptr [eax+10h], ebp
                                                                                dec eax
                                                                                mov dword ptr [eax+18h], esi
                                                                                dec eax
                                                                                mov dword ptr [eax+20h], edi
                                                                                inc ecx
                                                                                push esi
                                                                                dec eax
                                                                                sub esp, 20h
                                                                                dec ebp
                                                                                mov edx, dword ptr [ecx+38h]
                                                                                dec eax
                                                                                mov esi, edx
                                                                                dec ebp
                                                                                mov esi, eax
                                                                                dec eax
                                                                                mov ebp, ecx
                                                                                dec ecx
                                                                                mov edx, ecx
                                                                                dec eax
                                                                                mov ecx, esi
                                                                                dec ecx
                                                                                mov edi, ecx
                                                                                inc ecx
                                                                                mov ebx, dword ptr [edx]
                                                                                dec eax
                                                                                shl ebx, 04h
                                                                                dec ecx
                                                                                add ebx, edx
                                                                                dec esp
                                                                                lea eax, dword ptr [ebx+04h]
                                                                                call 00007F71FC4F1C23h
                                                                                mov eax, dword ptr [ebp+04h]
                                                                                and al, 66h
                                                                                neg al
                                                                                mov eax, 00000001h
                                                                                sbb edx, edx
                                                                                neg edx
                                                                                add edx, eax
                                                                                test dword ptr [ebx+04h], edx
                                                                                je 00007F71FC4F2933h
                                                                                dec esp
                                                                                mov ecx, edi
                                                                                dec ebp
                                                                                mov eax, esi
                                                                                dec eax
                                                                                mov edx, esi
                                                                                dec eax
                                                                                mov ecx, ebp
                                                                                call 00007F71FC4F4947h
                                                                                dec eax
                                                                                mov ebx, dword ptr [esp+30h]
                                                                                dec eax
                                                                                mov ebp, dword ptr [esp+38h]
                                                                                dec eax
                                                                                mov esi, dword ptr [esp+40h]
                                                                                dec eax
                                                                                mov edi, dword ptr [esp+48h]
                                                                                dec eax
                                                                                add esp, 20h
                                                                                inc ecx
                                                                                pop esi
                                                                                ret
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                dec eax
                                                                                sub esp, 48h
                                                                                dec eax
                                                                                lea ecx, dword ptr [esp+20h]
                                                                                call 00007F71FC4E11B3h
                                                                                dec eax
                                                                                lea edx, dword ptr [00025747h]
                                                                                dec eax
                                                                                lea ecx, dword ptr [esp+20h]
                                                                                call 00007F71FC4F3A02h
                                                                                int3
                                                                                jmp 00007F71FC4F9BE4h
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                Programming Language:
                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x154f4.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x970.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x700000x154f40x15600830fe0401acd1728e669a91fa1858e36False0.2520559210526316data4.6583703321340835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x860000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                PNG0x705540xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                PNG0x7109c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                RT_ICON0x726480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/m0.14468236129184905
                                                                                RT_DIALOG0x82e700x286dataEnglishUnited States0.5092879256965944
                                                                                RT_DIALOG0x830f80x13adataEnglishUnited States0.60828025477707
                                                                                RT_DIALOG0x832340xecdataEnglishUnited States0.6991525423728814
                                                                                RT_DIALOG0x833200x12edataEnglishUnited States0.5927152317880795
                                                                                RT_DIALOG0x834500x338dataEnglishUnited States0.45145631067961167
                                                                                RT_DIALOG0x837880x252dataEnglishUnited States0.5757575757575758
                                                                                RT_STRING0x839dc0x1e2dataEnglishUnited States0.3900414937759336
                                                                                RT_STRING0x83bc00x1ccdataEnglishUnited States0.4282608695652174
                                                                                RT_STRING0x83d8c0x1b8dataEnglishUnited States0.45681818181818185
                                                                                RT_STRING0x83f440x146dataEnglishUnited States0.5153374233128835
                                                                                RT_STRING0x8408c0x46cdataEnglishUnited States0.3454063604240283
                                                                                RT_STRING0x844f80x166dataEnglishUnited States0.49162011173184356
                                                                                RT_STRING0x846600x152dataEnglishUnited States0.5059171597633136
                                                                                RT_STRING0x847b40x10adataEnglishUnited States0.49624060150375937
                                                                                RT_STRING0x848c00xbcdataEnglishUnited States0.6329787234042553
                                                                                RT_STRING0x8497c0x1c0dataEnglishUnited States0.5178571428571429
                                                                                RT_STRING0x84b3c0x250dataEnglishUnited States0.44256756756756754
                                                                                RT_GROUP_ICON0x84d8c0x14data1.15
                                                                                RT_MANIFEST0x84da00x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39786666666666665
                                                                                DLLImport
                                                                                KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                                                OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 25, 2024 17:24:14.812747002 CET4916480192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.812880039 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.813553095 CET491658080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.932512999 CET8049164101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:14.932527065 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:14.932593107 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.932605028 CET4916480192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.933024883 CET808049165101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:14.933115959 CET491658080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.935239077 CET4916480192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.935251951 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.935251951 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.935281038 CET4916480192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.936204910 CET491658080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:14.936204910 CET491658080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:15.058480024 CET8049164101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:15.058499098 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:15.058542013 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:15.058549881 CET8049164101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:15.059341908 CET808049165101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:15.059350014 CET808049165101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:16.475804090 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:16.478280067 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:16.478323936 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:16.478323936 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:16.478323936 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:16.599020004 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:16.599353075 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:16.599361897 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:16.599400997 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:17.130951881 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:17.330307007 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:17.530478001 CET808049165101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:17.531028032 CET491658080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:17.531824112 CET491658080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:17.532052040 CET8049164101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:17.532134056 CET4916480192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:17.534008980 CET4916480192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:17.652268887 CET808049165101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:17.656179905 CET8049164101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:18.146233082 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:18.347388029 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:19.162170887 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:19.361433983 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:20.178141117 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:20.377624035 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:21.193471909 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:21.394553900 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:22.210428953 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:22.485606909 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:23.224801064 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:23.424685001 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:24.240367889 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:24.443732023 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:25.256329060 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:25.463794947 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:26.271733046 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:26.470843077 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:27.287188053 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:27.486921072 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:28.303212881 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:28.502978086 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:29.318999052 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:29.522125959 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:30.334167957 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:30.535209894 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:31.349813938 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:31.549148083 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:32.365381002 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:32.566207886 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:33.380786896 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:33.580271959 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:34.397006035 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:34.602423906 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:35.411981106 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:35.645385981 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:36.412336111 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:36.615474939 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:37.427834034 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:37.628503084 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:38.443511963 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:38.643651962 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:39.458878040 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:39.659616947 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:40.474632025 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:40.675682068 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:41.490776062 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:41.690742970 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:42.505928040 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:42.705914974 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:43.521796942 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:43.721858025 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:44.536938906 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:44.736922979 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:45.552943945 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:45.755989075 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:46.554375887 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:46.756035089 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:47.568671942 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:47.768095970 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:48.583584070 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:48.783255100 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:49.584206104 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:49.789213896 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:50.599713087 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:50.799273014 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:51.615271091 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:51.815345049 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:52.633574963 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:52.833399057 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:53.648346901 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:53.851457119 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:54.662065029 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:54.861515045 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:55.667439938 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:55.867580891 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:56.677489996 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:56.876630068 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:57.693166018 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:57.889698029 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:58.709026098 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:58.908751965 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:24:59.724518061 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:24:59.923820019 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:00.740268946 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:00.939882994 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:01.755635023 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:01.955952883 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:02.776933908 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:02.977009058 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:03.786799908 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:03.996069908 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:04.802628040 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:05.002233028 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:05.859903097 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:06.059170008 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:06.834022999 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:07.034313917 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:07.849498987 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:08.050287008 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:08.865230083 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:09.064352036 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:09.880604982 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:10.077409983 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:10.880913019 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:11.080472946 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:11.896480083 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:12.106532097 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:12.911940098 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:13.111605883 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:13.928356886 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:14.127640963 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.829646111 CET491668080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.829804897 CET4916780192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.943515062 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:14.949332952 CET808049166101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:14.949342966 CET8049167101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:14.949408054 CET4916780192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.949410915 CET491668080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.952739000 CET4916780192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.952752113 CET4916780192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.952768087 CET491668080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:14.952827930 CET491668080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:15.072577953 CET8049167101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:15.072587967 CET8049167101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:15.072597980 CET808049166101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:15.072602034 CET808049166101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:15.143699884 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:15.958981991 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:16.159751892 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:16.962517023 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:17.161820889 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:17.534373999 CET8049167101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:17.534444094 CET4916780192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:17.534506083 CET4916780192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:17.538110971 CET808049166101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:17.538163900 CET491668080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:17.538233042 CET491668080192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:17.654059887 CET8049167101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:17.657751083 CET808049166101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:17.974612951 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:18.175874949 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:18.990590096 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:19.191931963 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:19.990371943 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:20.190141916 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:21.371395111 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:21.540040016 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:21.544071913 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:22.021528006 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:22.223121881 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:23.036919117 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:23.246179104 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:24.052686930 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:24.334233046 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:25.068389893 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:25.268295050 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:26.084290981 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:26.284384966 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:27.219705105 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:27.419419050 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:28.115374088 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:28.314491034 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:29.130790949 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:29.330645084 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:30.131376982 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:30.331686020 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:31.146749020 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:31.346652031 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:32.398966074 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:32.598803997 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:32.704036951 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:32.704191923 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:33.178080082 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:33.377770901 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:34.193867922 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:34.393826962 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:35.209358931 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:35.411906958 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:36.224916935 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:36.424956083 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:37.240309954 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:37.445018053 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:38.257181883 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:38.457082987 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:39.271898985 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:39.471138000 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:40.287169933 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:40.487240076 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:41.287236929 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:41.487246990 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:42.303076029 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:42.502329111 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:43.320437908 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:43.520375013 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:44.333847046 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:44.533457994 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:45.349474907 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:45.550487041 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:46.349819899 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:46.549561024 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:47.365839958 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:47.567616940 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:48.370609045 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:48.570780039 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:49.381155014 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:49.580751896 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:50.397135973 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:50.606796026 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:51.411868095 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:51.611846924 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:52.427774906 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:52.634896040 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:53.443561077 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:53.642987013 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:54.460136890 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:54.663011074 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:55.474802971 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:55.697073936 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:56.490595102 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:56.694139004 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:57.506372929 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:57.706201077 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:58.521748066 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:58.719263077 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:59.127388954 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:59.128128052 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:25:59.537067890 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:25:59.737299919 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:26:00.552686930 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:26:00.752486944 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:26:01.568473101 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:26:01.768446922 CET491635651192.168.2.22101.99.91.150
                                                                                Dec 25, 2024 17:26:02.583733082 CET565149163101.99.91.150192.168.2.22
                                                                                Dec 25, 2024 17:26:02.780493021 CET491635651192.168.2.22101.99.91.150
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 25, 2024 17:23:04.511077881 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:05.262696028 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:06.027098894 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:13.909090042 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:14.658700943 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:15.408747911 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:22.900496960 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:23.650216103 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:24.400270939 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:25.648719072 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:26.398391962 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:23:27.148534060 CET137137192.168.2.22192.168.2.255
                                                                                Dec 25, 2024 17:24:42.238029003 CET138138192.168.2.22192.168.2.255
                                                                                TimestampSource IPDest IPChecksumCodeType
                                                                                Dec 25, 2024 17:22:57.632667065 CET192.168.2.228.8.8.84d5aEcho
                                                                                Dec 25, 2024 17:22:57.756275892 CET8.8.8.8192.168.2.22555aEcho Reply
                                                                                Dec 25, 2024 17:22:58.698338985 CET192.168.2.228.8.8.84d59Echo
                                                                                Dec 25, 2024 17:22:58.820831060 CET8.8.8.8192.168.2.225559Echo Reply
                                                                                Dec 25, 2024 17:22:59.740555048 CET192.168.2.228.8.8.84d58Echo
                                                                                Dec 25, 2024 17:22:59.863132954 CET8.8.8.8192.168.2.225558Echo Reply
                                                                                Dec 25, 2024 17:23:00.844245911 CET192.168.2.228.8.8.84d57Echo
                                                                                Dec 25, 2024 17:23:00.966800928 CET8.8.8.8192.168.2.225557Echo Reply
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.2249164101.99.91.150803580C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 25, 2024 17:24:14.935239077 CET6OUTData Raw: 00 00 00 01
                                                                                Data Ascii:
                                                                                Dec 25, 2024 17:24:14.935281038 CET6OUTData Raw: 00 00 00 03
                                                                                Data Ascii:


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.2249167101.99.91.150803580C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 25, 2024 17:25:14.952739000 CET6OUTData Raw: 00 00 00 01
                                                                                Data Ascii:
                                                                                Dec 25, 2024 17:25:14.952752113 CET6OUTData Raw: 00 00 00 03
                                                                                Data Ascii:


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:11:22:54
                                                                                Start date:25/12/2024
                                                                                Path:C:\Users\user\Desktop\0442.pdf.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\Desktop\0442.pdf.exe"
                                                                                Imagebase:0x13ff50000
                                                                                File size:11'409'543 bytes
                                                                                MD5 hash:4F6B2B9EE57C50D6C505D0CDADA4803E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:11:22:55
                                                                                Start date:25/12/2024
                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ms.msi" /qn
                                                                                Imagebase:0xff3c0000
                                                                                File size:128'512 bytes
                                                                                MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:11:22:56
                                                                                Start date:25/12/2024
                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\start.bat" "
                                                                                Imagebase:0x4ac30000
                                                                                File size:345'088 bytes
                                                                                MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:5
                                                                                Start time:11:22:56
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc.pdf"
                                                                                Imagebase:0x80000
                                                                                File size:2'525'680 bytes
                                                                                MD5 hash:2F8D93826B8CBF9290BC57535C7A6817
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:6
                                                                                Start time:11:22:56
                                                                                Start date:25/12/2024
                                                                                Path:C:\Windows\System32\PING.EXE
                                                                                Wow64 process (32bit):false
                                                                                Commandline:ping 8.8.8.8
                                                                                Imagebase:0xff950000
                                                                                File size:16'896 bytes
                                                                                MD5 hash:5FB30FE90736C7FC77DE637021B1CE7C
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:7
                                                                                Start time:11:22:56
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\AppData\Local\Temp\doc2.pdf"
                                                                                Imagebase:0x80000
                                                                                File size:2'525'680 bytes
                                                                                MD5 hash:2F8D93826B8CBF9290BC57535C7A6817
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:11:22:56
                                                                                Start date:25/12/2024
                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                Imagebase:0xff3c0000
                                                                                File size:128'512 bytes
                                                                                MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:false

                                                                                Target ID:9
                                                                                Start time:11:23:02
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /siex /silentinstall
                                                                                Imagebase:0x400000
                                                                                File size:6'307'408 bytes
                                                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000009.00000000.382903108.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 3%, ReversingLabs
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:10
                                                                                Start time:11:23:02
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /siex /silentinstall
                                                                                Imagebase:0x400000
                                                                                File size:7'753'808 bytes
                                                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 0000000A.00000000.383524670.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 8%, ReversingLabs
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:12
                                                                                Start time:11:23:04
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                Imagebase:0x260000
                                                                                File size:9'805'808 bytes
                                                                                MD5 hash:326A645391A97C760B60C558A35BB068
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:13
                                                                                Start time:11:23:06
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /firewall
                                                                                Imagebase:0x400000
                                                                                File size:6'307'408 bytes
                                                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:true

                                                                                Target ID:14
                                                                                Start time:11:23:06
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /firewall
                                                                                Imagebase:0x400000
                                                                                File size:7'753'808 bytes
                                                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:true

                                                                                Target ID:15
                                                                                Start time:11:23:11
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /server /start
                                                                                Imagebase:0x400000
                                                                                File size:6'307'408 bytes
                                                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:true

                                                                                Target ID:16
                                                                                Start time:11:23:12
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe" /start
                                                                                Imagebase:0x400000
                                                                                File size:7'753'808 bytes
                                                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:true

                                                                                Target ID:17
                                                                                Start time:11:23:12
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMServer.exe"
                                                                                Imagebase:0x400000
                                                                                File size:7'753'808 bytes
                                                                                MD5 hash:F3D74B072B9697CF64B0B8445FDC8128
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:false

                                                                                Target ID:19
                                                                                Start time:11:23:14
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe"
                                                                                Imagebase:0x400000
                                                                                File size:6'307'408 bytes
                                                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:false

                                                                                Target ID:20
                                                                                Start time:11:23:15
                                                                                Start date:25/12/2024
                                                                                Path:C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\LiteManager Pro - Server\ROMFUSClient.exe" /tray
                                                                                Imagebase:0x400000
                                                                                File size:6'307'408 bytes
                                                                                MD5 hash:63D0964168B927D00064AA684E79A300
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:12.6%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:27.5%
                                                                                  Total number of Nodes:1503
                                                                                  Total number of Limit Nodes:24
                                                                                  execution_graph 27267 13ff81edf MultiByteToWideChar SysAllocString GetLastError GetLastError 25410 13ff803e0 25411 13ff8041f 25410->25411 25412 13ff80497 25410->25412 25443 13ff6aae0 25411->25443 25413 13ff6aae0 48 API calls 25412->25413 25415 13ff804ab 25413->25415 25417 13ff6da98 48 API calls 25415->25417 25423 13ff80442 memcpy_s 25417->25423 25420 13ff80541 25440 13ff5250c 25420->25440 25422 13ff805cc 25425 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25422->25425 25423->25422 25424 13ff805c6 25423->25424 25435 13ff51fa0 25423->25435 25453 13ff87904 25424->25453 25428 13ff805d2 25425->25428 25436 13ff51fb3 25435->25436 25437 13ff51fdc 25435->25437 25436->25437 25438 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25436->25438 25437->25420 25439 13ff52000 25438->25439 25441 13ff52516 SetDlgItemTextW 25440->25441 25442 13ff52513 25440->25442 25442->25441 25444 13ff6aaf3 25443->25444 25458 13ff69774 25444->25458 25447 13ff6ab58 LoadStringW 25448 13ff6ab86 25447->25448 25449 13ff6ab71 LoadStringW 25447->25449 25450 13ff6da98 25448->25450 25449->25448 25495 13ff6d874 25450->25495 25623 13ff8783c 31 API calls 3 library calls 25453->25623 25455 13ff8791d 25624 13ff87934 16 API calls abort 25455->25624 25465 13ff69638 25458->25465 25461 13ff697d9 25475 13ff82320 25461->25475 25466 13ff69692 25465->25466 25474 13ff69730 25465->25474 25470 13ff696c0 25466->25470 25488 13ff70f68 WideCharToMultiByte 25466->25488 25468 13ff82320 _handle_error 8 API calls 25469 13ff69764 25468->25469 25469->25461 25484 13ff69800 25469->25484 25473 13ff696ef 25470->25473 25490 13ff6aa88 45 API calls _snwprintf 25470->25490 25491 13ff8a270 31 API calls 2 library calls 25473->25491 25474->25468 25476 13ff82329 25475->25476 25477 13ff697f2 25476->25477 25478 13ff82550 IsProcessorFeaturePresent 25476->25478 25477->25447 25477->25448 25479 13ff82568 25478->25479 25492 13ff82744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 25479->25492 25481 13ff8257b 25493 13ff82510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25481->25493 25485 13ff69840 25484->25485 25487 13ff69869 25484->25487 25494 13ff8a270 31 API calls 2 library calls 25485->25494 25487->25461 25489 13ff70faa 25488->25489 25489->25470 25490->25473 25491->25474 25492->25481 25494->25487 25511 13ff6d4d0 25495->25511 25500 13ff6d9a3 25502 13ff6da17 25500->25502 25505 13ff6da3f 25500->25505 25501 13ff6d8e5 _snwprintf 25508 13ff6d974 25501->25508 25525 13ff89ef0 25501->25525 25552 13ff59d78 33 API calls 25501->25552 25504 13ff82320 _handle_error 8 API calls 25502->25504 25506 13ff6da2b 25504->25506 25507 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25505->25507 25506->25423 25509 13ff6da44 25507->25509 25508->25500 25553 13ff59d78 33 API calls 25508->25553 25512 13ff6d665 25511->25512 25514 13ff6d502 25511->25514 25515 13ff6cb80 25512->25515 25513 13ff51744 33 API calls 25513->25514 25514->25512 25514->25513 25516 13ff6cbb6 25515->25516 25517 13ff6cc80 25515->25517 25520 13ff6cc20 25516->25520 25521 13ff6cc7b 25516->25521 25524 13ff6cbc6 25516->25524 25564 13ff52004 33 API calls std::_Xinvalid_argument 25517->25564 25520->25524 25554 13ff821d0 25520->25554 25563 13ff51f80 33 API calls 3 library calls 25521->25563 25524->25501 25526 13ff89f4e 25525->25526 25527 13ff89f36 25525->25527 25526->25527 25529 13ff89f58 25526->25529 25576 13ff8d69c 15 API calls abort 25527->25576 25578 13ff87ef0 25529->25578 25530 13ff89f3b 25577 13ff878e4 31 API calls _invalid_parameter_noinfo 25530->25577 25533 13ff89f46 25535 13ff82320 _handle_error 8 API calls 25533->25535 25534 13ff89f69 memcpy_s 25586 13ff87e70 15 API calls _set_fmode 25534->25586 25536 13ff8a10b 25535->25536 25536->25501 25538 13ff89fd4 25587 13ff882f8 46 API calls 3 library calls 25538->25587 25540 13ff89fdd 25541 13ff8a014 25540->25541 25542 13ff89fe5 25540->25542 25544 13ff8a06c 25541->25544 25545 13ff8a092 25541->25545 25546 13ff8a023 25541->25546 25547 13ff8a01a 25541->25547 25588 13ff8d90c 25542->25588 25548 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 25544->25548 25545->25544 25549 13ff8a09c 25545->25549 25550 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 25546->25550 25547->25544 25547->25546 25548->25533 25551 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 25549->25551 25550->25533 25551->25533 25552->25501 25553->25500 25555 13ff821db 25554->25555 25556 13ff821f4 25555->25556 25558 13ff821fa 25555->25558 25565 13ff8bbc0 25555->25565 25556->25524 25562 13ff82205 25558->25562 25568 13ff82f7c RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc std::_Xinvalid_argument 25558->25568 25561 13ff8220b 25569 13ff51f80 33 API calls 3 library calls 25562->25569 25563->25517 25570 13ff8bc00 25565->25570 25568->25562 25569->25561 25575 13ff8f398 EnterCriticalSection 25570->25575 25572 13ff8bc0d 25573 13ff8f3f8 abort LeaveCriticalSection 25572->25573 25574 13ff8bbd2 25573->25574 25574->25555 25576->25530 25577->25533 25579 13ff87f0b 25578->25579 25585 13ff87f06 25578->25585 25579->25585 25594 13ff8d440 GetLastError 25579->25594 25581 13ff87f28 25615 13ff8dcf4 35 API calls swprintf 25581->25615 25583 13ff87f4c 25616 13ff8dd28 35 API calls swprintf 25583->25616 25585->25534 25586->25538 25587->25540 25589 13ff8d911 HeapFree 25588->25589 25593 13ff8d941 Concurrency::details::SchedulerProxy::DeleteThis 25588->25593 25590 13ff8d92c 25589->25590 25589->25593 25622 13ff8d69c 15 API calls abort 25590->25622 25592 13ff8d931 GetLastError 25592->25593 25593->25533 25595 13ff8d46a 25594->25595 25596 13ff8d45d 25594->25596 25618 13ff8fa04 15 API calls 2 library calls 25595->25618 25617 13ff8f664 6 API calls __vcrt_uninitialize_ptd 25596->25617 25599 13ff8d462 25599->25595 25601 13ff8d4ab 25599->25601 25600 13ff8d479 25602 13ff8d481 25600->25602 25619 13ff8f6bc 6 API calls __vcrt_uninitialize_ptd 25600->25619 25603 13ff8d4b0 SetLastError 25601->25603 25604 13ff8d4c6 SetLastError 25601->25604 25607 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 25602->25607 25603->25581 25621 13ff8d068 35 API calls abort 25604->25621 25611 13ff8d488 25607->25611 25608 13ff8d498 25608->25602 25609 13ff8d49f 25608->25609 25620 13ff8d1f0 15 API calls abort 25609->25620 25611->25604 25613 13ff8d4a4 25614 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 25613->25614 25614->25601 25615->25583 25616->25585 25617->25599 25618->25600 25619->25608 25620->25613 25622->25592 25623->25455 27241 13ff8d7e0 66 API calls Concurrency::details::SchedulerProxy::DeleteThis 27268 13ff82ee0 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter __security_init_cookie 25694 13ff811cf 25696 13ff81102 25694->25696 25695 13ff81900 _com_raise_error 14 API calls 25695->25696 25696->25695 27336 13ff93cd0 48 API calls 27244 13ff76bd0 9 API calls _handle_error 27271 13ff8d6c0 16 API calls 2 library calls 27316 13ff8f9c0 FreeLibrary 27273 13ff692c0 8 API calls _handle_error 27318 13ff531bc 108 API calls _invalid_parameter_noinfo_noreturn 27340 13ff94cab 24 API calls _log10_special 27247 13ff753b0 146 API calls 27341 13ff76cb0 52 API calls 25625 13ff81491 25626 13ff813c9 25625->25626 25626->25625 25628 13ff81900 25626->25628 25654 13ff81558 25628->25654 25631 13ff8198b 25632 13ff81868 DloadReleaseSectionWriteAccess 6 API calls 25631->25632 25633 13ff81998 RaiseException 25632->25633 25634 13ff81bb5 25633->25634 25634->25626 25635 13ff81a3d LoadLibraryExA 25637 13ff81aa9 25635->25637 25638 13ff81a54 GetLastError 25635->25638 25636 13ff81b85 25662 13ff81868 25636->25662 25641 13ff81abd 25637->25641 25644 13ff81ab4 FreeLibrary 25637->25644 25642 13ff81a69 25638->25642 25643 13ff81a7e 25638->25643 25639 13ff819b4 25639->25635 25639->25636 25639->25637 25639->25641 25640 13ff81b1b GetProcAddress 25640->25636 25647 13ff81b30 GetLastError 25640->25647 25641->25636 25641->25640 25642->25637 25642->25643 25646 13ff81868 DloadReleaseSectionWriteAccess 6 API calls 25643->25646 25644->25641 25648 13ff81a8b RaiseException 25646->25648 25649 13ff81b45 25647->25649 25648->25634 25649->25636 25650 13ff81868 DloadReleaseSectionWriteAccess 6 API calls 25649->25650 25651 13ff81b67 RaiseException 25650->25651 25652 13ff81558 _com_raise_error 6 API calls 25651->25652 25653 13ff81b81 25652->25653 25653->25636 25655 13ff815d3 25654->25655 25656 13ff8156e 25654->25656 25655->25631 25655->25639 25670 13ff81604 25656->25670 25659 13ff815ce 25661 13ff81604 DloadReleaseSectionWriteAccess 3 API calls 25659->25661 25661->25655 25663 13ff81878 25662->25663 25669 13ff818d1 25662->25669 25664 13ff81604 DloadReleaseSectionWriteAccess 3 API calls 25663->25664 25665 13ff8187d 25664->25665 25666 13ff818cc 25665->25666 25667 13ff817d8 DloadProtectSection 3 API calls 25665->25667 25668 13ff81604 DloadReleaseSectionWriteAccess 3 API calls 25666->25668 25667->25666 25668->25669 25669->25634 25671 13ff8161f 25670->25671 25672 13ff81573 25670->25672 25671->25672 25673 13ff81624 GetModuleHandleW 25671->25673 25672->25659 25677 13ff817d8 25672->25677 25674 13ff81639 25673->25674 25675 13ff8163e GetProcAddress 25673->25675 25674->25672 25675->25674 25676 13ff81653 GetProcAddress 25675->25676 25676->25674 25678 13ff817fa DloadProtectSection 25677->25678 25679 13ff8183a VirtualProtect 25678->25679 25680 13ff81802 25678->25680 25682 13ff816a4 VirtualQuery GetSystemInfo 25678->25682 25679->25680 25680->25659 25682->25679 27278 13ff546a0 109 API calls _handle_error 27344 13ff510a0 36 API calls 27279 13ff82e94 GetModuleHandleW abort 27280 13ff8fa94 36 API calls 4 library calls 27282 13ff82290 48 API calls 2 library calls 25697 13ff7b190 26044 13ff5255c 25697->26044 25699 13ff7b1db 25700 13ff7be93 25699->25700 25701 13ff7b1ef 25699->25701 25747 13ff7b20c 25699->25747 26150 13ff7f390 25700->26150 25705 13ff7b1ff 25701->25705 25706 13ff7b2db 25701->25706 25701->25747 25704 13ff82320 _handle_error 8 API calls 25709 13ff7c350 25704->25709 25710 13ff7b207 25705->25710 25711 13ff7b2a9 25705->25711 25712 13ff7b391 25706->25712 25717 13ff7b2f5 25706->25717 25707 13ff7beba SendMessageW 25708 13ff7bec9 25707->25708 25714 13ff7bed5 SendDlgItemMessageW 25708->25714 25715 13ff7bef0 GetDlgItem SendMessageW 25708->25715 25720 13ff6aae0 48 API calls 25710->25720 25710->25747 25716 13ff7b2cb EndDialog 25711->25716 25711->25747 26052 13ff522bc GetDlgItem 25712->26052 25714->25715 26169 13ff662dc GetCurrentDirectoryW 25715->26169 25716->25747 25721 13ff6aae0 48 API calls 25717->25721 25724 13ff7b236 25720->25724 25725 13ff7b313 SetDlgItemTextW 25721->25725 25722 13ff7b3b1 EndDialog 25905 13ff7b3da 25722->25905 25723 13ff7bf47 GetDlgItem 26179 13ff52520 25723->26179 26183 13ff51ec4 34 API calls _handle_error 25724->26183 25729 13ff7b326 25725->25729 25728 13ff7b408 GetDlgItem 25733 13ff7b422 SendMessageW SendMessageW 25728->25733 25734 13ff7b44f SetFocus 25728->25734 25737 13ff7b340 GetMessageW 25729->25737 25729->25747 25731 13ff7bf7a 25735 13ff791e8 12 API calls 25731->25735 25732 13ff7b246 25736 13ff7b25c 25732->25736 25744 13ff5250c SetDlgItemTextW 25732->25744 25733->25734 25738 13ff7b465 25734->25738 25739 13ff7b4f2 25734->25739 25743 13ff7bf82 25735->25743 25736->25747 25754 13ff7c363 25736->25754 25746 13ff7b35e IsDialogMessageW 25737->25746 25737->25747 25740 13ff6aae0 48 API calls 25738->25740 26066 13ff58d04 25739->26066 25749 13ff7b46f 25740->25749 25741 13ff7bcc5 25750 13ff6aae0 48 API calls 25741->25750 25742 13ff51fa0 31 API calls 25742->25747 25751 13ff7a3a0 165 API calls 25743->25751 25744->25736 25746->25729 25748 13ff7b373 TranslateMessage DispatchMessageW 25746->25748 25747->25704 25748->25729 26184 13ff5129c 25749->26184 25755 13ff7bcd6 SetDlgItemTextW 25750->25755 25756 13ff7bfa2 25751->25756 25752 13ff7b52c 26076 13ff7ef80 25752->26076 25759 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25754->25759 25758 13ff6aae0 48 API calls 25755->25758 25760 13ff7bfce 25756->25760 25766 13ff7ce88 160 API calls 25756->25766 25764 13ff7bd08 25758->25764 25765 13ff7c368 25759->25765 25761 13ff7c00a 25760->25761 25767 13ff6aae0 48 API calls 25760->25767 25773 13ff7ce88 160 API calls 25761->25773 25805 13ff7c155 25761->25805 25762 13ff6aae0 48 API calls 25768 13ff7b555 25762->25768 25780 13ff5129c 33 API calls 25764->25780 25774 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25765->25774 25766->25760 25770 13ff7bfe1 SetDlgItemTextW 25767->25770 25771 13ff6da98 48 API calls 25768->25771 25769 13ff7b498 25772 13ff7f0a4 24 API calls 25769->25772 25776 13ff6aae0 48 API calls 25770->25776 25777 13ff7b568 25771->25777 25778 13ff7b4a5 25772->25778 25779 13ff7c025 25773->25779 25781 13ff7c36e 25774->25781 25775 13ff7c298 25782 13ff7c2a1 EnableWindow 25775->25782 25783 13ff7c2ac 25775->25783 25784 13ff7bffc SetDlgItemTextW 25776->25784 26090 13ff7f0a4 25777->26090 25778->25765 25786 13ff7b4e8 25778->25786 25791 13ff7c037 25779->25791 25820 13ff7c06e 25779->25820 25809 13ff7bd31 25780->25809 25793 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25781->25793 25782->25783 25787 13ff7c2d3 25783->25787 25788 13ff52298 GetDlgItem EnableWindow 25783->25788 25784->25761 25800 13ff7b5ec 25786->25800 26194 13ff7fa80 33 API calls 2 library calls 25786->26194 25789 13ff7c300 25787->25789 25806 13ff7c2f8 SendMessageW 25787->25806 25795 13ff7c2c4 25788->25795 25798 13ff7c328 25789->25798 25808 13ff6aae0 48 API calls 25789->25808 25799 13ff77b28 39 API calls 25791->25799 25792 13ff7bdda 25801 13ff6aae0 48 API calls 25792->25801 25802 13ff7c374 25793->25802 25794 13ff7c147 25803 13ff7ce88 160 API calls 25794->25803 25804 13ff52298 GetDlgItem EnableWindow 25795->25804 25796 13ff7c25c 25813 13ff77b28 39 API calls 25796->25813 25797 13ff51fa0 31 API calls 25807 13ff7b586 25797->25807 25810 13ff51fa0 31 API calls 25798->25810 25799->25820 25812 13ff7b61a 25800->25812 26195 13ff632a8 25800->26195 25814 13ff7bde4 25801->25814 25818 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25802->25818 25803->25805 25804->25787 25805->25775 25805->25796 25833 13ff5129c 33 API calls 25805->25833 25842 13ff6aae0 48 API calls 25805->25842 25855 13ff51150 33 API calls 25805->25855 25871 13ff52034 33 API calls 25805->25871 25900 13ff51fa0 31 API calls 25805->25900 25806->25789 25807->25781 25807->25786 25815 13ff7c319 SetDlgItemTextW 25808->25815 25809->25792 25819 13ff5129c 33 API calls 25809->25819 25810->25747 26104 13ff62f58 25812->26104 25817 13ff7c28d 25813->25817 25824 13ff5129c 33 API calls 25814->25824 25815->25798 25823 13ff51fa0 31 API calls 25817->25823 25825 13ff7c37a 25818->25825 25826 13ff7bd7f 25819->25826 25820->25794 25827 13ff7ce88 160 API calls 25820->25827 25823->25775 25831 13ff7be0d 25824->25831 25832 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25825->25832 25834 13ff6aae0 48 API calls 25826->25834 25835 13ff7c0ad 25827->25835 25829 13ff7b634 GetLastError 25830 13ff7b64c 25829->25830 26116 13ff67fc4 25830->26116 25848 13ff5129c 33 API calls 25831->25848 25837 13ff7c380 25832->25837 25833->25805 25838 13ff7bd8a 25834->25838 25835->25794 25839 13ff7c0ba DialogBoxParamW 25835->25839 25836 13ff7b60e 26198 13ff79d90 12 API calls _handle_error 25836->26198 25849 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25837->25849 25843 13ff51150 33 API calls 25838->25843 25839->25794 25844 13ff7c0e2 EndDialog 25839->25844 25842->25805 25850 13ff7bda2 25843->25850 25844->25747 25851 13ff7c104 25844->25851 25845 13ff7b65e 25846 13ff7b665 GetLastError 25845->25846 25847 13ff7b674 25845->25847 25846->25847 25852 13ff7b71c 25847->25852 25856 13ff7b72b 25847->25856 25857 13ff7b68b GetTickCount 25847->25857 25853 13ff7be4e 25848->25853 25854 13ff7c386 25849->25854 26228 13ff52034 25850->26228 25851->25747 25851->25837 25852->25856 25859 13ff7bb79 25852->25859 25868 13ff51fa0 31 API calls 25853->25868 25858 13ff5255c 61 API calls 25854->25858 25855->25805 25864 13ff7ba50 25856->25864 26199 13ff66454 25856->26199 26119 13ff54228 25857->26119 25863 13ff7c3e4 25858->25863 26149 13ff52534 GetDlgItem ShowWindow 25859->26149 25869 13ff7c3e8 25863->25869 25878 13ff7c489 GetDlgItem SetFocus 25863->25878 25926 13ff7c3fd 25863->25926 25864->25722 26223 13ff5bd0c 33 API calls 25864->26223 25865 13ff7bdbe 25873 13ff51fa0 31 API calls 25865->25873 25867 13ff7bb8e 25875 13ff52534 GetDlgItem ShowWindow 25867->25875 25876 13ff7be78 25868->25876 25885 13ff82320 _handle_error 8 API calls 25869->25885 25871->25805 25880 13ff7bdcc 25873->25880 25882 13ff7bb9d 25875->25882 25883 13ff51fa0 31 API calls 25876->25883 25877 13ff7ba75 26224 13ff51150 25877->26224 25888 13ff7c4ba 25878->25888 25879 13ff7b74e 26211 13ff6b914 102 API calls 25879->26211 25887 13ff51fa0 31 API calls 25880->25887 25881 13ff7b6ba 25889 13ff51fa0 31 API calls 25881->25889 25890 13ff6aae0 48 API calls 25882->25890 25891 13ff7be83 25883->25891 25893 13ff7ca97 25885->25893 25887->25792 25902 13ff5129c 33 API calls 25888->25902 25895 13ff7b6c8 25889->25895 25896 13ff7bba7 SetDlgItemTextW 25890->25896 25897 13ff51fa0 31 API calls 25891->25897 25892 13ff7ba8a 25898 13ff6aae0 48 API calls 25892->25898 25894 13ff7b768 25901 13ff6da98 48 API calls 25894->25901 26129 13ff62134 25895->26129 25904 13ff52534 GetDlgItem ShowWindow 25896->25904 25897->25905 25906 13ff7ba97 25898->25906 25899 13ff7c434 SendDlgItemMessageW 25907 13ff7c454 25899->25907 25908 13ff7c45d EndDialog 25899->25908 25900->25805 25909 13ff7b7aa GetCommandLineW 25901->25909 25903 13ff7c4cc 25902->25903 26232 13ff680d8 33 API calls 25903->26232 25911 13ff7bbc5 SetDlgItemTextW GetDlgItem 25904->25911 25905->25742 25912 13ff51150 33 API calls 25906->25912 25907->25908 25908->25869 25913 13ff7b84f 25909->25913 25914 13ff7b869 25909->25914 25918 13ff7bc13 25911->25918 25919 13ff7bbf0 GetWindowLongPtrW SetWindowLongPtrW 25911->25919 25920 13ff7baaa 25912->25920 26212 13ff520b0 25913->26212 26216 13ff7ab54 33 API calls _handle_error 25914->26216 25915 13ff7c4e0 25921 13ff5250c SetDlgItemTextW 25915->25921 25924 13ff7ce88 160 API calls 25918->25924 25919->25918 25925 13ff51fa0 31 API calls 25920->25925 25928 13ff7c4f4 25921->25928 25922 13ff7b87a 26217 13ff7ab54 33 API calls _handle_error 25922->26217 25932 13ff7bc2b 25924->25932 25933 13ff7bab5 25925->25933 25926->25869 25926->25899 25938 13ff7c526 SendDlgItemMessageW FindFirstFileW 25928->25938 25930 13ff7b6f5 GetLastError 25931 13ff7b704 25930->25931 26145 13ff6204c 25931->26145 25936 13ff7ce88 160 API calls 25932->25936 25937 13ff51fa0 31 API calls 25933->25937 25934 13ff7b88b 26218 13ff7ab54 33 API calls _handle_error 25934->26218 25941 13ff7bc3c 25936->25941 25942 13ff7bac3 25937->25942 25943 13ff7c57b 25938->25943 26036 13ff7ca04 25938->26036 25946 13ff7f974 238 API calls 25941->25946 25952 13ff6aae0 48 API calls 25942->25952 25953 13ff6aae0 48 API calls 25943->25953 25944 13ff7b89c 26219 13ff6b9b4 102 API calls 25944->26219 25948 13ff7bc52 25946->25948 25951 13ff7ce88 160 API calls 25948->25951 25949 13ff7b8b3 26220 13ff7fbdc 33 API calls 25949->26220 25950 13ff7ca81 25950->25869 25966 13ff7bc6a 25951->25966 25956 13ff7badb 25952->25956 25957 13ff7c59e 25953->25957 25955 13ff7caa9 25959 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25955->25959 25967 13ff5129c 33 API calls 25956->25967 25969 13ff5129c 33 API calls 25957->25969 25958 13ff7b8d2 CreateFileMappingW 25961 13ff7b953 ShellExecuteExW 25958->25961 25962 13ff7b911 MapViewOfFile 25958->25962 25963 13ff7caae 25959->25963 25960 13ff7bc96 25964 13ff52298 GetDlgItem EnableWindow 25960->25964 25984 13ff7b974 25961->25984 26221 13ff83640 25962->26221 25970 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25963->25970 25968 13ff7b3f5 25964->25968 25966->25960 25971 13ff7ce88 160 API calls 25966->25971 25979 13ff7bb04 25967->25979 25968->25722 25968->25741 25972 13ff7c5cd 25969->25972 25973 13ff7cab4 25970->25973 25971->25960 25974 13ff51150 33 API calls 25972->25974 25977 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25973->25977 25975 13ff7c5e8 25974->25975 26233 13ff5e164 33 API calls 2 library calls 25975->26233 25976 13ff7b9c3 25985 13ff7b9ef 25976->25985 25986 13ff7b9dc UnmapViewOfFile CloseHandle 25976->25986 25982 13ff7caba 25977->25982 25978 13ff7bb5a 25980 13ff51fa0 31 API calls 25978->25980 25979->25825 25979->25978 25980->25722 25989 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25982->25989 25983 13ff7c5ff 25987 13ff51fa0 31 API calls 25983->25987 25984->25976 25992 13ff7b9b1 Sleep 25984->25992 25985->25802 25988 13ff7ba25 25985->25988 25986->25985 25991 13ff7c60c 25987->25991 25990 13ff51fa0 31 API calls 25988->25990 25993 13ff7cac0 25989->25993 25994 13ff7ba42 25990->25994 25991->25963 25997 13ff51fa0 31 API calls 25991->25997 25992->25976 25992->25984 25995 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25993->25995 25996 13ff51fa0 31 API calls 25994->25996 25998 13ff7cac6 25995->25998 25996->25864 25999 13ff7c673 25997->25999 26001 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 25998->26001 26000 13ff5250c SetDlgItemTextW 25999->26000 26002 13ff7c687 FindClose 26000->26002 26003 13ff7cacc 26001->26003 26004 13ff7c797 SendDlgItemMessageW 26002->26004 26005 13ff7c6a3 26002->26005 26007 13ff7c7cb 26004->26007 26234 13ff7a2cc 10 API calls _handle_error 26005->26234 26010 13ff6aae0 48 API calls 26007->26010 26008 13ff7c6c6 26009 13ff6aae0 48 API calls 26008->26009 26011 13ff7c6cf 26009->26011 26012 13ff7c7d8 26010->26012 26013 13ff6da98 48 API calls 26011->26013 26014 13ff5129c 33 API calls 26012->26014 26017 13ff7c6ec memcpy_s 26013->26017 26016 13ff7c807 26014->26016 26015 13ff51fa0 31 API calls 26018 13ff7c783 26015->26018 26019 13ff51150 33 API calls 26016->26019 26017->25973 26017->26015 26020 13ff5250c SetDlgItemTextW 26018->26020 26021 13ff7c822 26019->26021 26020->26004 26235 13ff5e164 33 API calls 2 library calls 26021->26235 26023 13ff7c839 26024 13ff51fa0 31 API calls 26023->26024 26025 13ff7c845 memcpy_s 26024->26025 26026 13ff51fa0 31 API calls 26025->26026 26027 13ff7c87f 26026->26027 26028 13ff51fa0 31 API calls 26027->26028 26029 13ff7c88c 26028->26029 26029->25982 26030 13ff51fa0 31 API calls 26029->26030 26031 13ff7c8f3 26030->26031 26032 13ff5250c SetDlgItemTextW 26031->26032 26033 13ff7c907 26032->26033 26033->26036 26236 13ff7a2cc 10 API calls _handle_error 26033->26236 26035 13ff7c932 26037 13ff6aae0 48 API calls 26035->26037 26036->25869 26036->25950 26036->25955 26036->25998 26038 13ff7c93c 26037->26038 26039 13ff6da98 48 API calls 26038->26039 26042 13ff7c959 memcpy_s 26039->26042 26040 13ff51fa0 31 API calls 26041 13ff7c9f0 26040->26041 26043 13ff5250c SetDlgItemTextW 26041->26043 26042->25993 26042->26040 26043->26036 26045 13ff525d0 26044->26045 26046 13ff5256a 26044->26046 26045->25699 26046->26045 26237 13ff6a4ac 26046->26237 26048 13ff5258f 26048->26045 26049 13ff525a4 GetDlgItem 26048->26049 26049->26045 26050 13ff525b7 26049->26050 26050->26045 26051 13ff525be SetWindowTextW 26050->26051 26051->26045 26053 13ff52334 26052->26053 26054 13ff522fc 26052->26054 26290 13ff523f8 GetWindowTextLengthW 26053->26290 26056 13ff5129c 33 API calls 26054->26056 26057 13ff5232a memcpy_s 26056->26057 26058 13ff51fa0 31 API calls 26057->26058 26061 13ff52389 26057->26061 26058->26061 26059 13ff523c8 26060 13ff82320 _handle_error 8 API calls 26059->26060 26062 13ff523dd 26060->26062 26061->26059 26063 13ff523f0 26061->26063 26062->25722 26062->25728 26062->25968 26064 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26063->26064 26065 13ff523f5 26064->26065 26068 13ff58d34 26066->26068 26074 13ff58de8 26066->26074 26070 13ff58d91 26068->26070 26071 13ff58de3 26068->26071 26073 13ff58d42 memcpy_s 26068->26073 26070->26073 26075 13ff821d0 33 API calls 26070->26075 26314 13ff51f80 33 API calls 3 library calls 26071->26314 26073->25752 26315 13ff52004 33 API calls std::_Xinvalid_argument 26074->26315 26075->26073 26080 13ff7efb0 26076->26080 26077 13ff82320 _handle_error 8 API calls 26078 13ff7b537 26077->26078 26078->25762 26079 13ff7efd7 26079->26077 26080->26079 26316 13ff5bd0c 33 API calls 26080->26316 26082 13ff7f02a 26083 13ff51150 33 API calls 26082->26083 26084 13ff7f03f 26083->26084 26085 13ff51fa0 31 API calls 26084->26085 26087 13ff7f04f memcpy_s 26084->26087 26085->26087 26086 13ff51fa0 31 API calls 26088 13ff7f076 26086->26088 26087->26086 26089 13ff51fa0 31 API calls 26088->26089 26089->26079 26317 13ff7ae1c PeekMessageW 26090->26317 26093 13ff7f0f5 26097 13ff7f101 ShowWindow SendMessageW SendMessageW 26093->26097 26094 13ff7f143 SendMessageW SendMessageW 26095 13ff7f1a4 SendMessageW 26094->26095 26096 13ff7f189 26094->26096 26098 13ff7f1c6 SendMessageW SendMessageW 26095->26098 26099 13ff7f1c3 26095->26099 26096->26095 26097->26094 26100 13ff7f218 SendMessageW 26098->26100 26101 13ff7f1f3 SendMessageW 26098->26101 26099->26098 26102 13ff82320 _handle_error 8 API calls 26100->26102 26101->26100 26103 13ff7b578 26102->26103 26103->25797 26105 13ff6309d 26104->26105 26112 13ff62f8e 26104->26112 26106 13ff82320 _handle_error 8 API calls 26105->26106 26107 13ff630b3 26106->26107 26107->25829 26107->25830 26108 13ff63077 26108->26105 26109 13ff63684 56 API calls 26108->26109 26109->26105 26110 13ff5129c 33 API calls 26110->26112 26112->26108 26112->26110 26113 13ff630c8 26112->26113 26322 13ff63684 26112->26322 26114 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26113->26114 26115 13ff630cd 26114->26115 26117 13ff67fd2 SetCurrentDirectoryW 26116->26117 26118 13ff67fcf 26116->26118 26117->25845 26118->26117 26120 13ff54255 26119->26120 26121 13ff5426a 26120->26121 26122 13ff5129c 33 API calls 26120->26122 26123 13ff82320 _handle_error 8 API calls 26121->26123 26122->26121 26124 13ff542a1 26123->26124 26125 13ff53c84 26124->26125 26126 13ff53cab 26125->26126 26455 13ff5710c 26126->26455 26128 13ff53cbb memcpy_s 26128->25881 26132 13ff6216a 26129->26132 26130 13ff6219e 26133 13ff6227f 26130->26133 26135 13ff66a0c 49 API calls 26130->26135 26131 13ff621b1 CreateFileW 26131->26130 26132->26130 26132->26131 26134 13ff622af 26133->26134 26138 13ff520b0 33 API calls 26133->26138 26136 13ff82320 _handle_error 8 API calls 26134->26136 26137 13ff62209 26135->26137 26139 13ff622c4 26136->26139 26140 13ff62246 26137->26140 26141 13ff6220d CreateFileW 26137->26141 26138->26134 26139->25930 26139->25931 26140->26133 26142 13ff622d8 26140->26142 26141->26140 26143 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26142->26143 26144 13ff622dd 26143->26144 26146 13ff62066 26145->26146 26147 13ff62072 26145->26147 26146->26147 26467 13ff620d0 26146->26467 26474 13ff7849c 26150->26474 26153 13ff7f4b7 26155 13ff82320 _handle_error 8 API calls 26153->26155 26154 13ff7f3c7 GetWindow 26159 13ff7f3e2 26154->26159 26156 13ff7be9b 26155->26156 26156->25707 26156->25708 26157 13ff7f3ee GetClassNameW 26479 13ff713c4 CompareStringW 26157->26479 26159->26153 26159->26157 26160 13ff7f417 GetWindowLongPtrW 26159->26160 26161 13ff7f496 GetWindow 26159->26161 26160->26161 26162 13ff7f429 SendMessageW 26160->26162 26161->26153 26161->26159 26162->26161 26163 13ff7f445 GetObjectW 26162->26163 26480 13ff78504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26163->26480 26166 13ff7f461 26481 13ff784cc 26166->26481 26485 13ff78df4 16 API calls _handle_error 26166->26485 26168 13ff7f479 SendMessageW DeleteObject 26168->26161 26170 13ff66300 26169->26170 26176 13ff6638d 26169->26176 26171 13ff513a4 33 API calls 26170->26171 26172 13ff6631b GetCurrentDirectoryW 26171->26172 26173 13ff66341 26172->26173 26174 13ff520b0 33 API calls 26173->26174 26175 13ff6634f 26174->26175 26175->26176 26177 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26175->26177 26176->25723 26178 13ff663a9 26177->26178 26180 13ff52527 26179->26180 26181 13ff5252a SetWindowTextW 26179->26181 26180->26181 26182 13ffbe2e0 26181->26182 26183->25732 26185 13ff512d0 26184->26185 26186 13ff5139b 26184->26186 26189 13ff51396 26185->26189 26190 13ff51338 26185->26190 26193 13ff512de memcpy_s 26185->26193 26489 13ff52004 33 API calls std::_Xinvalid_argument 26186->26489 26488 13ff51f80 33 API calls 3 library calls 26189->26488 26192 13ff821d0 33 API calls 26190->26192 26190->26193 26192->26193 26193->25769 26194->25800 26196 13ff632bc 51 API calls 26195->26196 26197 13ff632b1 26196->26197 26197->25812 26197->25836 26198->25812 26200 13ff513a4 33 API calls 26199->26200 26201 13ff66489 26200->26201 26202 13ff6648c GetModuleFileNameW 26201->26202 26205 13ff664dc 26201->26205 26203 13ff664a7 26202->26203 26204 13ff664de 26202->26204 26203->26201 26204->26205 26206 13ff5129c 33 API calls 26205->26206 26208 13ff66506 26206->26208 26207 13ff6653e 26207->25879 26208->26207 26209 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26208->26209 26210 13ff66560 26209->26210 26211->25894 26213 13ff520f6 26212->26213 26215 13ff520cb memcpy_s 26212->26215 26490 13ff51474 33 API calls 3 library calls 26213->26490 26215->25914 26216->25922 26217->25934 26218->25944 26219->25949 26220->25958 26222 13ff83620 26221->26222 26222->25961 26222->26222 26223->25877 26225 13ff51177 26224->26225 26226 13ff52034 33 API calls 26225->26226 26227 13ff51185 memcpy_s 26226->26227 26227->25892 26229 13ff52085 26228->26229 26231 13ff52059 memcpy_s 26228->26231 26491 13ff515b8 33 API calls 3 library calls 26229->26491 26231->25865 26232->25915 26233->25983 26234->26008 26235->26023 26236->26035 26262 13ff63e28 26237->26262 26240 13ff70f68 WideCharToMultiByte 26258 13ff6a519 26240->26258 26241 13ff6a589 26266 13ff69408 26241->26266 26244 13ff6a603 26246 13ff6a6c2 26244->26246 26247 13ff6a60c GetWindowLongPtrW 26244->26247 26245 13ff6a6f2 GetSystemMetrics GetWindow 26248 13ff6a821 26245->26248 26259 13ff6a71d 26245->26259 26281 13ff695a8 26246->26281 26250 13ffbe2c0 26247->26250 26249 13ff82320 _handle_error 8 API calls 26248->26249 26252 13ff6a830 26249->26252 26253 13ff6a6aa GetWindowRect 26250->26253 26252->26048 26253->26246 26255 13ff69800 31 API calls 26255->26258 26256 13ff6a73e GetWindowRect 26256->26259 26257 13ff6a6e5 SetWindowTextW 26257->26245 26258->26241 26258->26255 26260 13ff6a56a SetDlgItemTextW 26258->26260 26259->26248 26259->26256 26261 13ff6a800 GetWindow 26259->26261 26260->26258 26261->26248 26261->26259 26263 13ff63e4d _snwprintf 26262->26263 26264 13ff89ef0 swprintf 46 API calls 26263->26264 26265 13ff63e69 26264->26265 26265->26240 26267 13ff695a8 47 API calls 26266->26267 26271 13ff6944f 26267->26271 26268 13ff6955a 26269 13ff82320 _handle_error 8 API calls 26268->26269 26270 13ff6958e GetWindowRect GetClientRect 26269->26270 26270->26244 26270->26245 26271->26268 26272 13ff5129c 33 API calls 26271->26272 26273 13ff6949c 26272->26273 26275 13ff5129c 33 API calls 26273->26275 26280 13ff695a1 26273->26280 26274 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26276 13ff695a7 26274->26276 26277 13ff69514 26275->26277 26277->26268 26278 13ff6959c 26277->26278 26279 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26278->26279 26279->26280 26280->26274 26282 13ff63e28 swprintf 46 API calls 26281->26282 26283 13ff695eb 26282->26283 26284 13ff70f68 WideCharToMultiByte 26283->26284 26285 13ff69603 26284->26285 26286 13ff69800 31 API calls 26285->26286 26287 13ff6961b 26286->26287 26288 13ff82320 _handle_error 8 API calls 26287->26288 26289 13ff6962b 26288->26289 26289->26245 26289->26257 26302 13ff513a4 26290->26302 26293 13ff52494 26294 13ff5129c 33 API calls 26293->26294 26295 13ff524a2 26294->26295 26296 13ff524dd 26295->26296 26299 13ff52505 26295->26299 26297 13ff82320 _handle_error 8 API calls 26296->26297 26298 13ff524f3 26297->26298 26298->26057 26300 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26299->26300 26301 13ff5250a 26300->26301 26303 13ff513ad 26302->26303 26304 13ff5142d GetWindowTextW 26302->26304 26305 13ff513ce 26303->26305 26306 13ff5143d 26303->26306 26304->26293 26309 13ff821d0 33 API calls 26305->26309 26310 13ff513db memcpy_s 26305->26310 26313 13ff52018 33 API calls std::_Xinvalid_argument 26306->26313 26309->26310 26312 13ff5197c 31 API calls _invalid_parameter_noinfo_noreturn 26310->26312 26312->26304 26314->26074 26316->26082 26318 13ff7ae80 GetDlgItem 26317->26318 26319 13ff7ae3c GetMessageW 26317->26319 26318->26093 26318->26094 26320 13ff7ae5b IsDialogMessageW 26319->26320 26321 13ff7ae6a TranslateMessage DispatchMessageW 26319->26321 26320->26318 26320->26321 26321->26318 26324 13ff636b3 26322->26324 26323 13ff636e0 26342 13ff632bc 26323->26342 26324->26323 26325 13ff636cc CreateDirectoryW 26324->26325 26325->26323 26327 13ff6377d 26325->26327 26329 13ff6378d 26327->26329 26429 13ff63d34 26327->26429 26333 13ff82320 _handle_error 8 API calls 26329->26333 26330 13ff63791 GetLastError 26330->26329 26335 13ff637b9 26333->26335 26335->26112 26336 13ff63720 CreateDirectoryW 26337 13ff6373b 26336->26337 26338 13ff63774 26337->26338 26339 13ff637ce 26337->26339 26338->26327 26338->26330 26340 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26339->26340 26341 13ff637d3 26340->26341 26343 13ff632e7 GetFileAttributesW 26342->26343 26344 13ff632e4 26342->26344 26345 13ff632f8 26343->26345 26353 13ff63375 26343->26353 26344->26343 26346 13ff66a0c 49 API calls 26345->26346 26348 13ff6331f 26346->26348 26347 13ff82320 _handle_error 8 API calls 26349 13ff63389 26347->26349 26350 13ff63323 GetFileAttributesW 26348->26350 26351 13ff6333c 26348->26351 26349->26330 26356 13ff66a0c 26349->26356 26350->26351 26352 13ff63399 26351->26352 26351->26353 26354 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26352->26354 26353->26347 26355 13ff6339e 26354->26355 26357 13ff66a4b 26356->26357 26376 13ff66a44 26356->26376 26359 13ff5129c 33 API calls 26357->26359 26358 13ff82320 _handle_error 8 API calls 26360 13ff6371c 26358->26360 26361 13ff66a76 26359->26361 26360->26336 26360->26337 26362 13ff66cc7 26361->26362 26363 13ff66a96 26361->26363 26364 13ff662dc 35 API calls 26362->26364 26365 13ff66ab0 26363->26365 26390 13ff66b49 26363->26390 26368 13ff66ce6 26364->26368 26366 13ff670ab 26365->26366 26443 13ff5c098 33 API calls 2 library calls 26365->26443 26451 13ff52004 33 API calls std::_Xinvalid_argument 26366->26451 26369 13ff66eef 26368->26369 26373 13ff66d1b 26368->26373 26426 13ff66b44 26368->26426 26372 13ff670cf 26369->26372 26448 13ff5c098 33 API calls 2 library calls 26369->26448 26370 13ff670b1 26380 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26370->26380 26454 13ff52004 33 API calls std::_Xinvalid_argument 26372->26454 26379 13ff670bd 26373->26379 26446 13ff5c098 33 API calls 2 library calls 26373->26446 26374 13ff670d5 26381 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26374->26381 26376->26358 26377 13ff66b03 26391 13ff51fa0 31 API calls 26377->26391 26395 13ff66b15 memcpy_s 26377->26395 26452 13ff52004 33 API calls std::_Xinvalid_argument 26379->26452 26388 13ff670b7 26380->26388 26389 13ff670db 26381->26389 26382 13ff670a6 26387 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26382->26387 26383 13ff66f56 26449 13ff511cc 33 API calls memcpy_s 26383->26449 26386 13ff51fa0 31 API calls 26386->26426 26387->26366 26398 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26388->26398 26400 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26389->26400 26394 13ff5129c 33 API calls 26390->26394 26390->26426 26391->26395 26393 13ff670c3 26397 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26393->26397 26401 13ff66bbe 26394->26401 26395->26386 26396 13ff66f69 26450 13ff657ac 33 API calls memcpy_s 26396->26450 26403 13ff670c9 26397->26403 26398->26379 26399 13ff51fa0 31 API calls 26411 13ff66df5 26399->26411 26405 13ff670e1 26400->26405 26444 13ff65820 33 API calls 26401->26444 26453 13ff5704c 47 API calls memcpy_s 26403->26453 26404 13ff66d76 memcpy_s 26404->26393 26404->26399 26407 13ff66bd3 26445 13ff5e164 33 API calls 2 library calls 26407->26445 26410 13ff51fa0 31 API calls 26413 13ff66fec 26410->26413 26415 13ff66e21 26411->26415 26447 13ff51744 33 API calls 4 library calls 26411->26447 26412 13ff66f79 memcpy_s 26412->26389 26412->26410 26414 13ff51fa0 31 API calls 26413->26414 26418 13ff66ff6 26414->26418 26415->26403 26419 13ff5129c 33 API calls 26415->26419 26417 13ff51fa0 31 API calls 26421 13ff66c6d 26417->26421 26422 13ff51fa0 31 API calls 26418->26422 26423 13ff66ec2 26419->26423 26420 13ff66be9 memcpy_s 26420->26388 26420->26417 26424 13ff51fa0 31 API calls 26421->26424 26422->26426 26425 13ff52034 33 API calls 26423->26425 26424->26426 26427 13ff66edf 26425->26427 26426->26370 26426->26374 26426->26376 26426->26382 26428 13ff51fa0 31 API calls 26427->26428 26428->26426 26430 13ff63d5e SetFileAttributesW 26429->26430 26431 13ff63d5b 26429->26431 26432 13ff63d74 26430->26432 26440 13ff63df5 26430->26440 26431->26430 26433 13ff66a0c 49 API calls 26432->26433 26435 13ff63d99 26433->26435 26434 13ff82320 _handle_error 8 API calls 26436 13ff63e0a 26434->26436 26437 13ff63d9d SetFileAttributesW 26435->26437 26438 13ff63dbc 26435->26438 26436->26329 26437->26438 26439 13ff63e1a 26438->26439 26438->26440 26441 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26439->26441 26440->26434 26442 13ff63e1f 26441->26442 26443->26377 26444->26407 26445->26420 26446->26404 26447->26415 26448->26383 26449->26396 26450->26412 26453->26372 26456 13ff57206 26455->26456 26457 13ff5713b 26455->26457 26465 13ff5704c 47 API calls memcpy_s 26456->26465 26463 13ff5714b memcpy_s 26457->26463 26464 13ff53f48 33 API calls 2 library calls 26457->26464 26460 13ff57273 26460->26128 26461 13ff5720b 26461->26460 26466 13ff5889c 8 API calls memcpy_s 26461->26466 26463->26128 26464->26463 26465->26461 26466->26461 26468 13ff62102 26467->26468 26469 13ff620ea 26467->26469 26470 13ff62126 26468->26470 26473 13ff5b544 99 API calls 26468->26473 26469->26468 26471 13ff620f6 CloseHandle 26469->26471 26470->26147 26471->26468 26473->26470 26475 13ff784cc 4 API calls 26474->26475 26476 13ff784aa 26475->26476 26477 13ff784b9 26476->26477 26486 13ff78504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26476->26486 26477->26153 26477->26154 26479->26159 26480->26166 26482 13ff784de 26481->26482 26483 13ff784e3 26481->26483 26487 13ff78590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26482->26487 26483->26166 26485->26168 26486->26477 26487->26483 26488->26186 26490->26215 26491->26231 27283 13ff7ae90 95 API calls 27347 13ff62090 100 API calls 27349 13ff82c80 59 API calls 2 library calls 26504 13ff85178 26511 13ff8726c 26504->26511 26507 13ff85185 26512 13ff87274 26511->26512 26514 13ff872a5 26512->26514 26515 13ff85181 26512->26515 26525 13ff87568 26512->26525 26530 13ff872b4 DeleteCriticalSection 26514->26530 26515->26507 26517 13ff852ec 26515->26517 26541 13ff8743c 26517->26541 26531 13ff872ec 26525->26531 26528 13ff875b3 InitializeCriticalSectionAndSpinCount 26529 13ff875a8 26528->26529 26529->26512 26530->26515 26532 13ff87413 26531->26532 26533 13ff87330 __vcrt_FlsAlloc 26531->26533 26532->26528 26532->26529 26533->26532 26534 13ff8735e LoadLibraryExW 26533->26534 26535 13ff873f5 GetProcAddress 26533->26535 26540 13ff873a1 LoadLibraryExW 26533->26540 26536 13ff8737f GetLastError 26534->26536 26537 13ff873d5 26534->26537 26535->26532 26539 13ff87406 26535->26539 26536->26533 26537->26535 26538 13ff873ec FreeLibrary 26537->26538 26538->26535 26539->26532 26540->26533 26540->26537 26542 13ff872ec __vcrt_FlsAlloc 5 API calls 26541->26542 26543 13ff87461 TlsAlloc 26542->26543 26559 13ff82d6c 26584 13ff827fc 26559->26584 26562 13ff82eb8 26684 13ff83170 7 API calls 2 library calls 26562->26684 26563 13ff82d88 __scrt_acquire_startup_lock 26565 13ff82ec2 26563->26565 26568 13ff82da6 26563->26568 26685 13ff83170 7 API calls 2 library calls 26565->26685 26567 13ff82dcb 26568->26567 26574 13ff82de8 __scrt_release_startup_lock 26568->26574 26592 13ff8cd90 26568->26592 26570 13ff82ecd abort 26571 13ff82e51 26597 13ff832bc 26571->26597 26573 13ff82e56 26600 13ff8cd20 26573->26600 26574->26571 26681 13ff8c050 35 API calls __GSHandlerCheck_EH 26574->26681 26686 13ff82fb0 26584->26686 26587 13ff8282b 26688 13ff8cc50 26587->26688 26588 13ff82827 26588->26562 26588->26563 26593 13ff8cdeb 26592->26593 26594 13ff8cdcc 26592->26594 26593->26574 26594->26593 26858 13ff82d50 26594->26858 26866 13ff51120 26594->26866 26898 13ff83cf0 26597->26898 26599 13ff832d3 GetStartupInfoW 26599->26573 26601 13ff90730 48 API calls 26600->26601 26602 13ff8cd2f 26601->26602 26604 13ff82e5e 26602->26604 26900 13ff90ac0 35 API calls swprintf 26602->26900 26605 13ff80754 26604->26605 26901 13ff6dfd0 26605->26901 26608 13ff662dc 35 API calls 26609 13ff8079a 26608->26609 26978 13ff7946c 26609->26978 26611 13ff807a4 memcpy_s 26983 13ff79a14 26611->26983 26613 13ff80ddc 26616 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26613->26616 26614 13ff80819 26614->26613 26615 13ff8096e GetCommandLineW 26614->26615 26618 13ff80980 26615->26618 26619 13ff80b42 26615->26619 26617 13ff80de2 26616->26617 26621 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26617->26621 26624 13ff5129c 33 API calls 26618->26624 26620 13ff66454 34 API calls 26619->26620 26622 13ff80b51 26620->26622 26623 13ff80de8 26621->26623 26625 13ff51fa0 31 API calls 26622->26625 26628 13ff80b68 memcpy_s 26622->26628 26630 13ff81900 _com_raise_error 14 API calls 26623->26630 26627 13ff809a5 26624->26627 26625->26628 26626 13ff51fa0 31 API calls 26629 13ff80b93 SetEnvironmentVariableW GetLocalTime 26626->26629 27024 13ff7cad0 103 API calls 3 library calls 26627->27024 26628->26626 26632 13ff63e28 swprintf 46 API calls 26629->26632 26633 13ff80e34 26630->26633 26635 13ff80c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 26632->26635 26634 13ff809af 26634->26617 26636 13ff809f9 OpenFileMappingW 26634->26636 26637 13ff80adb 26634->26637 26993 13ff7b014 LoadBitmapW 26635->26993 26639 13ff80a19 MapViewOfFile 26636->26639 26640 13ff80ad0 CloseHandle 26636->26640 26644 13ff5129c 33 API calls 26637->26644 26639->26640 26642 13ff80a3f UnmapViewOfFile MapViewOfFile 26639->26642 26640->26619 26642->26640 26645 13ff80a71 26642->26645 26647 13ff80b00 26644->26647 27025 13ff7a190 33 API calls 2 library calls 26645->27025 26646 13ff80c75 27017 13ff767b4 26646->27017 27029 13ff7fd0c 35 API calls 2 library calls 26647->27029 26651 13ff80a81 27026 13ff7fd0c 35 API calls 2 library calls 26651->27026 26653 13ff767b4 33 API calls 26656 13ff80c87 DialogBoxParamW 26653->26656 26654 13ff80b0a 26654->26619 26659 13ff80dd7 26654->26659 26663 13ff80cd3 26656->26663 26657 13ff80a90 27027 13ff6b9b4 102 API calls 26657->27027 26661 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 26659->26661 26660 13ff80aa5 27028 13ff6bb00 102 API calls 26660->27028 26661->26613 26665 13ff80cec 26663->26665 26666 13ff80ce6 Sleep 26663->26666 26664 13ff80ab8 26667 13ff80ac7 UnmapViewOfFile 26664->26667 26668 13ff80cfa 26665->26668 27030 13ff79f4c 49 API calls 2 library calls 26665->27030 26666->26665 26667->26640 26670 13ff80d06 DeleteObject 26668->26670 26671 13ff80d1f DeleteObject 26670->26671 26672 13ff80d25 26670->26672 26671->26672 26673 13ff80d5b 26672->26673 26676 13ff80d6d 26672->26676 27031 13ff7fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 26673->27031 26675 13ff80d60 CloseHandle 26675->26676 27020 13ff794e4 26676->27020 26681->26571 26684->26565 26685->26570 26687 13ff8281e __scrt_dllmain_crt_thread_attach 26686->26687 26687->26587 26687->26588 26689 13ff90d4c 26688->26689 26690 13ff82830 26689->26690 26695 13ff90730 26689->26695 26699 13ff8f350 26689->26699 26705 13ff8d580 26689->26705 26690->26588 26694 13ff851a0 7 API calls 2 library calls 26690->26694 26694->26588 26696 13ff9073d 26695->26696 26697 13ff90749 26695->26697 26712 13ff90570 26696->26712 26697->26689 26701 13ff8f358 26699->26701 26702 13ff8f389 26701->26702 26703 13ff8f385 26701->26703 26845 13ff8f724 26701->26845 26850 13ff8f3c0 DeleteCriticalSection 26702->26850 26703->26689 26851 13ff8f5b4 26705->26851 26708 13ff8d59b 26708->26689 26710 13ff8d5a4 26710->26708 26857 13ff8d5c0 6 API calls __vcrt_uninitialize_ptd 26710->26857 26713 13ff8d440 abort 35 API calls 26712->26713 26714 13ff90589 26713->26714 26732 13ff90758 26714->26732 26719 13ff905ac 26719->26697 26721 13ff90658 26723 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26721->26723 26723->26719 26726 13ff90653 26767 13ff8d69c 15 API calls abort 26726->26767 26728 13ff906b5 26728->26721 26768 13ff9002c 31 API calls abort 26728->26768 26729 13ff90678 26729->26728 26730 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26729->26730 26730->26728 26733 13ff8d440 abort 35 API calls 26732->26733 26734 13ff90767 26733->26734 26735 13ff90782 26734->26735 26769 13ff8f398 EnterCriticalSection 26734->26769 26737 13ff90592 26735->26737 26770 13ff8d068 35 API calls abort 26735->26770 26743 13ff9027c 26737->26743 26744 13ff87ef0 swprintf 35 API calls 26743->26744 26745 13ff90290 26744->26745 26746 13ff9029c GetOEMCP 26745->26746 26747 13ff902ae 26745->26747 26748 13ff902c3 26746->26748 26747->26748 26749 13ff902b3 GetACP 26747->26749 26748->26719 26750 13ff8d94c 26748->26750 26749->26748 26751 13ff8d95b abort 26750->26751 26752 13ff8d997 26750->26752 26751->26752 26753 13ff8d97e RtlAllocateHeap 26751->26753 26756 13ff8bbc0 abort 2 API calls 26751->26756 26771 13ff8d69c 15 API calls abort 26752->26771 26753->26751 26755 13ff8d995 26753->26755 26755->26721 26757 13ff90818 26755->26757 26756->26751 26758 13ff9027c 37 API calls 26757->26758 26759 13ff90845 26758->26759 26760 13ff9084d 26759->26760 26761 13ff9088f IsValidCodePage 26759->26761 26766 13ff908b5 memcpy_s 26759->26766 26763 13ff82320 _handle_error 8 API calls 26760->26763 26761->26760 26762 13ff908a0 GetCPInfo 26761->26762 26762->26760 26762->26766 26764 13ff9064c 26763->26764 26764->26726 26764->26729 26772 13ff9038c GetCPInfo 26766->26772 26767->26721 26768->26721 26771->26755 26773 13ff904b5 26772->26773 26775 13ff903d5 26772->26775 26777 13ff82320 _handle_error 8 API calls 26773->26777 26782 13ff91758 26775->26782 26779 13ff90559 26777->26779 26779->26760 26781 13ff8f2b8 swprintf 40 API calls 26781->26773 26783 13ff87ef0 swprintf 35 API calls 26782->26783 26784 13ff9179a MultiByteToWideChar 26783->26784 26786 13ff917df 26784->26786 26787 13ff917d8 26784->26787 26788 13ff8d94c swprintf 16 API calls 26786->26788 26790 13ff9180d memcpy_s _snwprintf 26786->26790 26789 13ff82320 _handle_error 8 API calls 26787->26789 26788->26790 26791 13ff90449 26789->26791 26792 13ff9187d MultiByteToWideChar 26790->26792 26794 13ff918b8 26790->26794 26796 13ff8f2b8 26791->26796 26793 13ff9189e GetStringTypeW 26792->26793 26792->26794 26793->26794 26794->26787 26795 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26794->26795 26795->26787 26797 13ff87ef0 swprintf 35 API calls 26796->26797 26798 13ff8f2dd 26797->26798 26801 13ff8ef5c 26798->26801 26802 13ff8ef9e swprintf 26801->26802 26803 13ff8efc2 MultiByteToWideChar 26802->26803 26804 13ff8f26d 26803->26804 26805 13ff8eff4 26803->26805 26806 13ff82320 _handle_error 8 API calls 26804->26806 26808 13ff8d94c swprintf 16 API calls 26805->26808 26811 13ff8f02c _snwprintf 26805->26811 26807 13ff8f27b 26806->26807 26807->26781 26808->26811 26809 13ff8f090 MultiByteToWideChar 26810 13ff8f0b6 26809->26810 26814 13ff8f141 26809->26814 26828 13ff8f79c 26810->26828 26811->26809 26811->26814 26814->26804 26815 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26814->26815 26815->26804 26816 13ff8f0fe 26816->26814 26818 13ff8f79c swprintf 6 API calls 26816->26818 26817 13ff8f150 26819 13ff8d94c swprintf 16 API calls 26817->26819 26822 13ff8f17b _snwprintf 26817->26822 26818->26814 26819->26822 26820 13ff8f79c swprintf 6 API calls 26821 13ff8f20e 26820->26821 26823 13ff8f244 26821->26823 26824 13ff8f238 WideCharToMultiByte 26821->26824 26822->26814 26822->26820 26823->26814 26825 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26823->26825 26824->26823 26826 13ff8f2a4 26824->26826 26825->26814 26826->26814 26827 13ff8d90c Concurrency::details::SchedulerProxy::DeleteThis 15 API calls 26826->26827 26827->26814 26834 13ff8f414 26828->26834 26832 13ff8f848 LCMapStringW 26833 13ff8f0e8 26832->26833 26833->26814 26833->26816 26833->26817 26835 13ff8f475 26834->26835 26838 13ff8f470 26834->26838 26835->26833 26844 13ff8f88c 5 API calls 2 library calls 26835->26844 26836 13ff8f49d LoadLibraryExW 26836->26838 26839 13ff8f4be GetLastError 26836->26839 26837 13ff8f530 GetProcAddress 26841 13ff8f541 26837->26841 26838->26835 26838->26836 26840 13ff8f522 26838->26840 26843 13ff8f507 FreeLibrary 26838->26843 26839->26838 26842 13ff8f4c9 LoadLibraryExW 26839->26842 26840->26835 26840->26837 26841->26835 26842->26838 26843->26838 26844->26832 26846 13ff8f414 __vcrt_uninitialize_ptd 5 API calls 26845->26846 26847 13ff8f75f 26846->26847 26848 13ff8f77c InitializeCriticalSectionAndSpinCount 26847->26848 26849 13ff8f767 26847->26849 26848->26849 26849->26701 26850->26703 26852 13ff8f414 __vcrt_uninitialize_ptd 5 API calls 26851->26852 26853 13ff8f5e0 26852->26853 26854 13ff8f5f8 TlsAlloc 26853->26854 26855 13ff8d590 26853->26855 26854->26855 26855->26708 26856 13ff8d4d4 15 API calls 2 library calls 26855->26856 26856->26710 26857->26708 26871 13ff83354 SetUnhandledExceptionFilter 26858->26871 26872 13ff591c8 26866->26872 26870 13ff82a01 26870->26594 26880 13ff656a4 26872->26880 26874 13ff591df 26883 13ff6b788 26874->26883 26878 13ff51130 26879 13ff829bc 34 API calls 26878->26879 26879->26870 26889 13ff656e8 26880->26889 26884 13ff513a4 33 API calls 26883->26884 26885 13ff59365 26884->26885 26886 13ff59a28 26885->26886 26887 13ff656e8 2 API calls 26886->26887 26888 13ff59a36 26887->26888 26888->26878 26890 13ff656fe memcpy_s 26889->26890 26893 13ff6eba4 26890->26893 26896 13ff6eb58 GetCurrentProcess GetProcessAffinityMask 26893->26896 26897 13ff656de 26896->26897 26897->26874 26899 13ff83cd0 26898->26899 26899->26599 26899->26899 26900->26602 27032 13ff82450 26901->27032 26904 13ff6e026 GetProcAddress 26906 13ff6e053 GetProcAddress 26904->26906 26907 13ff6e03b 26904->26907 26905 13ff6e07b 26908 13ff6e503 26905->26908 27051 13ff8b788 39 API calls _snwprintf 26905->27051 26906->26905 26910 13ff6e068 26906->26910 26907->26906 26909 13ff66454 34 API calls 26908->26909 26912 13ff6e50c 26909->26912 26910->26905 27034 13ff67df4 26912->27034 26913 13ff6e3b0 26913->26908 26915 13ff6e3ba 26913->26915 26916 13ff66454 34 API calls 26915->26916 26917 13ff6e3c3 CreateFileW 26916->26917 26919 13ff6e403 SetFilePointer 26917->26919 26920 13ff6e4f0 CloseHandle 26917->26920 26919->26920 26921 13ff6e41c ReadFile 26919->26921 26922 13ff51fa0 31 API calls 26920->26922 26921->26920 26923 13ff6e444 26921->26923 26922->26908 26924 13ff6e458 26923->26924 26925 13ff6e800 26923->26925 26930 13ff5129c 33 API calls 26924->26930 27057 13ff82624 8 API calls 26925->27057 26927 13ff5129c 33 API calls 26943 13ff6e51a 26927->26943 26928 13ff6e805 26929 13ff6e53e CompareStringW 26929->26943 26934 13ff6e48f 26930->26934 26932 13ff51fa0 31 API calls 26932->26943 26939 13ff6e4db 26934->26939 27052 13ff6d0a0 33 API calls 26934->27052 26935 13ff6e648 27053 13ff67eb0 47 API calls 26935->27053 26936 13ff6e7c2 26937 13ff51fa0 31 API calls 26936->26937 26942 13ff6e7cb 26937->26942 26938 13ff632bc 51 API calls 26938->26943 26944 13ff51fa0 31 API calls 26939->26944 26941 13ff6e651 26945 13ff651a4 9 API calls 26941->26945 26947 13ff51fa0 31 API calls 26942->26947 26943->26927 26943->26929 26943->26932 26943->26938 26961 13ff6e5cc 26943->26961 27042 13ff651a4 26943->27042 27047 13ff68090 26943->27047 26948 13ff6e4e5 26944->26948 26949 13ff6e656 26945->26949 26946 13ff5129c 33 API calls 26946->26961 26950 13ff6e7d5 26947->26950 26951 13ff51fa0 31 API calls 26948->26951 26952 13ff6e706 26949->26952 26959 13ff6e661 26949->26959 26954 13ff82320 _handle_error 8 API calls 26950->26954 26951->26920 26955 13ff6da98 48 API calls 26952->26955 26953 13ff68090 47 API calls 26953->26961 26956 13ff6e7e4 26954->26956 26957 13ff6e74b AllocConsole 26955->26957 26956->26608 26960 13ff6e755 GetCurrentProcessId AttachConsole 26957->26960 26977 13ff6e6fb 26957->26977 26958 13ff51fa0 31 API calls 26958->26961 26964 13ff6aae0 48 API calls 26959->26964 26962 13ff6e76c 26960->26962 26961->26946 26961->26953 26961->26958 26963 13ff632bc 51 API calls 26961->26963 26967 13ff6e63a 26961->26967 26970 13ff6e778 GetStdHandle WriteConsoleW Sleep FreeConsole 26962->26970 26963->26961 26966 13ff6e6a5 26964->26966 26969 13ff6da98 48 API calls 26966->26969 26967->26935 26967->26936 26968 13ff6e7b9 ExitProcess 26971 13ff6e6c3 26969->26971 26970->26977 26972 13ff6aae0 48 API calls 26971->26972 26973 13ff6e6ce 26972->26973 27054 13ff6dc2c 33 API calls 26973->27054 26975 13ff6e6da 27055 13ff519e0 31 API calls _invalid_parameter_noinfo_noreturn 26975->27055 27056 13ff519e0 31 API calls _invalid_parameter_noinfo_noreturn 26977->27056 26979 13ff6dd88 26978->26979 26980 13ff79481 OleInitialize 26979->26980 26981 13ff794a7 26980->26981 26982 13ff794cd SHGetMalloc 26981->26982 26982->26611 26984 13ff79a4e memcpy_s 26983->26984 26985 13ff79a49 26983->26985 26987 13ff51fa0 31 API calls 26984->26987 26988 13ff79a7d memcpy_s 26984->26988 26986 13ff51fa0 31 API calls 26985->26986 26986->26984 26987->26988 26989 13ff51fa0 31 API calls 26988->26989 26990 13ff79aac memcpy_s 26988->26990 26989->26990 26991 13ff51fa0 31 API calls 26990->26991 26992 13ff79adb memcpy_s 26990->26992 26991->26992 26992->26614 26994 13ff7b03e 26993->26994 26995 13ff7b046 26993->26995 27068 13ff78624 FindResourceW 26994->27068 26996 13ff7b063 26995->26996 26997 13ff7b04e GetObjectW 26995->26997 26999 13ff7849c 4 API calls 26996->26999 26997->26996 27000 13ff7b078 26999->27000 27001 13ff7b0ce 27000->27001 27002 13ff7b09e 27000->27002 27003 13ff78624 11 API calls 27000->27003 27012 13ff698ac 27001->27012 27083 13ff78504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27002->27083 27005 13ff7b08a 27003->27005 27005->27002 27007 13ff7b092 DeleteObject 27005->27007 27006 13ff7b0a7 27008 13ff784cc 4 API calls 27006->27008 27007->27002 27009 13ff7b0b2 27008->27009 27084 13ff78df4 16 API calls _handle_error 27009->27084 27011 13ff7b0bf DeleteObject 27011->27001 27085 13ff698dc 27012->27085 27014 13ff698ba 27152 13ff6a43c GetModuleHandleW FindResourceW 27014->27152 27016 13ff698c2 27016->26646 27018 13ff821d0 33 API calls 27017->27018 27019 13ff767fa 27018->27019 27019->26653 27021 13ff79501 27020->27021 27022 13ff7950a OleUninitialize 27021->27022 27023 13ffbe330 27022->27023 27024->26634 27025->26651 27026->26657 27027->26660 27028->26664 27029->26654 27030->26668 27031->26675 27033 13ff6dff4 GetModuleHandleW 27032->27033 27033->26904 27033->26905 27035 13ff67e0c 27034->27035 27036 13ff67e55 27035->27036 27037 13ff67e23 27035->27037 27058 13ff5704c 47 API calls memcpy_s 27036->27058 27040 13ff5129c 33 API calls 27037->27040 27039 13ff67e5a 27041 13ff67e47 27040->27041 27041->26943 27043 13ff651c8 GetVersionExW 27042->27043 27044 13ff651fb 27042->27044 27043->27044 27045 13ff82320 _handle_error 8 API calls 27044->27045 27046 13ff65228 27045->27046 27046->26943 27048 13ff680a5 27047->27048 27059 13ff68188 27048->27059 27050 13ff680ca 27050->26943 27051->26913 27052->26934 27053->26941 27054->26975 27055->26977 27056->26968 27057->26928 27058->27039 27060 13ff68326 27059->27060 27064 13ff681ba 27059->27064 27067 13ff5704c 47 API calls memcpy_s 27060->27067 27062 13ff681d4 memcpy_s 27062->27050 27063 13ff6832b 27064->27062 27066 13ff658a4 33 API calls 2 library calls 27064->27066 27066->27062 27067->27063 27069 13ff7879b 27068->27069 27070 13ff7864f SizeofResource 27068->27070 27069->26995 27070->27069 27071 13ff78669 LoadResource 27070->27071 27071->27069 27072 13ff78682 LockResource 27071->27072 27072->27069 27073 13ff78697 GlobalAlloc 27072->27073 27073->27069 27074 13ff786b8 GlobalLock 27073->27074 27075 13ff78792 GlobalFree 27074->27075 27076 13ff786ca memcpy_s 27074->27076 27075->27069 27077 13ff786d8 CreateStreamOnHGlobal 27076->27077 27078 13ff786f6 GdipAlloc 27077->27078 27079 13ff78789 GlobalUnlock 27077->27079 27080 13ff7870b 27078->27080 27079->27075 27080->27079 27081 13ff78772 27080->27081 27082 13ff7875a GdipCreateHBITMAPFromBitmap 27080->27082 27081->27079 27082->27081 27083->27006 27084->27011 27088 13ff698fe _snwprintf 27085->27088 27086 13ff69973 27199 13ff668b0 48 API calls 27086->27199 27088->27086 27089 13ff69a89 27088->27089 27092 13ff699fd 27089->27092 27095 13ff520b0 33 API calls 27089->27095 27090 13ff51fa0 31 API calls 27090->27092 27091 13ff6997d memcpy_s 27091->27090 27093 13ff6a42e 27091->27093 27154 13ff624c0 27092->27154 27094 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 27093->27094 27096 13ff6a434 27094->27096 27095->27092 27099 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 27096->27099 27101 13ff6a43a 27099->27101 27100 13ff69a22 27102 13ff6204c 100 API calls 27100->27102 27105 13ff69a2b 27102->27105 27103 13ff69b17 27172 13ff8a450 27103->27172 27105->27096 27106 13ff69a66 27105->27106 27110 13ff82320 _handle_error 8 API calls 27106->27110 27107 13ff69aad 27107->27103 27111 13ff68e58 33 API calls 27107->27111 27109 13ff8a450 31 API calls 27123 13ff69b57 __vcrt_FlsAlloc 27109->27123 27112 13ff6a40e 27110->27112 27111->27107 27112->27014 27113 13ff69c89 27114 13ff62aa0 101 API calls 27113->27114 27126 13ff69d5c 27113->27126 27117 13ff69ca1 27114->27117 27118 13ff628d0 104 API calls 27117->27118 27117->27126 27124 13ff69cc9 27118->27124 27120 13ff6204c 100 API calls 27121 13ff6a3f5 27120->27121 27122 13ff51fa0 31 API calls 27121->27122 27122->27106 27123->27113 27123->27126 27180 13ff62bb0 27123->27180 27189 13ff628d0 27123->27189 27194 13ff62aa0 27123->27194 27124->27126 27146 13ff69cd7 __vcrt_FlsAlloc 27124->27146 27200 13ff70bbc MultiByteToWideChar 27124->27200 27126->27120 27127 13ff6a1ec 27137 13ff6a2c2 27127->27137 27206 13ff8cf90 31 API calls 2 library calls 27127->27206 27129 13ff6a157 27129->27127 27203 13ff8cf90 31 API calls 2 library calls 27129->27203 27130 13ff6a14b 27130->27014 27133 13ff6a3a2 27136 13ff8a450 31 API calls 27133->27136 27134 13ff6a249 27207 13ff8b7bc 31 API calls _invalid_parameter_noinfo_noreturn 27134->27207 27135 13ff6a2ae 27135->27137 27208 13ff68cd0 33 API calls 2 library calls 27135->27208 27139 13ff6a3cb 27136->27139 27137->27133 27144 13ff68e58 33 API calls 27137->27144 27141 13ff8a450 31 API calls 27139->27141 27140 13ff6a16d 27204 13ff8b7bc 31 API calls _invalid_parameter_noinfo_noreturn 27140->27204 27141->27126 27143 13ff6a1d8 27143->27127 27205 13ff68cd0 33 API calls 2 library calls 27143->27205 27144->27137 27146->27126 27146->27127 27146->27129 27146->27130 27147 13ff6a429 27146->27147 27148 13ff70f68 WideCharToMultiByte 27146->27148 27201 13ff6aa88 45 API calls _snwprintf 27146->27201 27202 13ff8a270 31 API calls 2 library calls 27146->27202 27209 13ff82624 8 API calls 27147->27209 27148->27146 27153 13ff6a468 27152->27153 27153->27016 27155 13ff624fd CreateFileW 27154->27155 27157 13ff625ae GetLastError 27155->27157 27160 13ff6266e 27155->27160 27158 13ff66a0c 49 API calls 27157->27158 27159 13ff625dc 27158->27159 27161 13ff625e0 CreateFileW GetLastError 27159->27161 27166 13ff6262c 27159->27166 27162 13ff626b1 SetFileTime 27160->27162 27165 13ff626cf 27160->27165 27161->27166 27162->27165 27163 13ff62708 27164 13ff82320 _handle_error 8 API calls 27163->27164 27167 13ff6271b 27164->27167 27165->27163 27168 13ff520b0 33 API calls 27165->27168 27166->27160 27169 13ff62736 27166->27169 27167->27100 27167->27107 27168->27163 27170 13ff87904 _invalid_parameter_noinfo_noreturn 31 API calls 27169->27170 27171 13ff6273b 27170->27171 27173 13ff8a47d 27172->27173 27179 13ff8a492 27173->27179 27210 13ff8d69c 15 API calls abort 27173->27210 27175 13ff8a487 27211 13ff878e4 31 API calls _invalid_parameter_noinfo 27175->27211 27176 13ff82320 _handle_error 8 API calls 27178 13ff69b37 27176->27178 27178->27109 27179->27176 27181 13ff62bcd 27180->27181 27185 13ff62be9 27180->27185 27182 13ff62bfb 27181->27182 27212 13ff5b9c4 99 API calls std::_Xinvalid_argument 27181->27212 27182->27123 27184 13ff62c01 SetFilePointer 27184->27182 27186 13ff62c1e GetLastError 27184->27186 27185->27182 27185->27184 27186->27182 27187 13ff62c28 27186->27187 27187->27182 27213 13ff5b9c4 99 API calls std::_Xinvalid_argument 27187->27213 27191 13ff628f6 27189->27191 27193 13ff628fd 27189->27193 27190 13ff62320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27190->27193 27191->27123 27193->27190 27193->27191 27214 13ff5b8a4 99 API calls std::_Xinvalid_argument 27193->27214 27215 13ff62778 27194->27215 27197 13ff62ac7 27197->27123 27199->27091 27200->27146 27201->27146 27202->27146 27203->27140 27204->27143 27205->27127 27206->27134 27207->27135 27208->27137 27209->27093 27210->27175 27211->27179 27216 13ff62789 _snwprintf 27215->27216 27217 13ff62890 SetFilePointer 27216->27217 27221 13ff627b5 27216->27221 27220 13ff628b8 GetLastError 27217->27220 27217->27221 27218 13ff82320 _handle_error 8 API calls 27219 13ff6281d 27218->27219 27219->27197 27222 13ff5b9c4 99 API calls std::_Xinvalid_argument 27219->27222 27220->27221 27221->27218 27223 13ff80df5 14 API calls _com_raise_error 27252 13ff83370 44 API calls __GSHandlerCheck_EH 27352 13ff51070 10 API calls _handle_error 27255 13ff97760 VariantClear 27290 13ff87a60 QueryPerformanceFrequency QueryPerformanceCounter 27291 13ff78260 GdipAlloc 27292 13ff7f260 66 API calls 2 library calls 25690 13ff8154b 25691 13ff814a2 25690->25691 25691->25690 25692 13ff81900 _com_raise_error 14 API calls 25691->25692 25692->25691 27257 13ff90b50 GetCommandLineA GetCommandLineW 27295 13ff95a50 CloseHandle 27355 13ff6ec50 106 API calls 27356 13ff96846 82 API calls std::_Xinvalid_argument 27297 13ff84a48 35 API calls __GSHandlerCheck_EH 27258 13ff8cb40 15 API calls 27357 13ff8ec40 16 API calls 27358 13ff82040 LocalFree 27259 13ff79b40 84 API calls 2 library calls 27361 13ff8c438 52 API calls Concurrency::details::SchedulerProxy::DeleteThis 27300 13ff96e29 GetDlgItem EnableWindow ShowWindow SendMessageW 26546 13ff8bf2c 26553 13ff8bc34 26546->26553 26548 13ff8bf31 26549 13ff8f3f8 abort LeaveCriticalSection 26548->26549 26550 13ff8bf3c 26549->26550 26551 13ff8bf64 11 API calls 26550->26551 26552 13ff8bf48 26550->26552 26551->26552 26554 13ff8d440 abort 35 API calls 26553->26554 26555 13ff8bc3f 26554->26555 26558 13ff8d068 35 API calls abort 26555->26558 27326 13ff90d20 GetProcessHeap 27363 13ff51020 34 API calls 27304 13ff82a10 49 API calls 27327 13ff77d10 37 API calls 27305 13ff80204 103 API calls 27306 13ff5220a 33 API calls 3 library calls 27366 13ff8ec00 36 API calls abort 27329 13ff974f2 LeaveCriticalSection abort 27264 13ff82ef4 RtlUnwindEx __GSHandlerCheck_SEH __GSHandlerCheckCommon 27308 13ff96df5 86 API calls 27310 13ff8bdf8 47 API calls abort 27368 13ff867ed 45 API calls 2 library calls 27224 13ff820f0 27225 13ff82106 _com_error::_com_error 27224->27225 27230 13ff84078 27225->27230 27227 13ff82117 27228 13ff81900 _com_raise_error 14 API calls 27227->27228 27229 13ff82163 27228->27229 27231 13ff840b4 RtlPcToFileHeader 27230->27231 27232 13ff84097 27230->27232 27233 13ff840db RaiseException 27231->27233 27234 13ff840cc 27231->27234 27232->27231 27233->27227 27234->27233 27312 13ff811e2 14 API calls _com_raise_error 27334 13ff518ec 31 API calls __std_exception_copy
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$DialogText$File$ErrorLast$CloseFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmap
                                                                                  • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                                  • API String ID: 255727823-2702805183
                                                                                  • Opcode ID: 65fbecc059460ab6d6c133513960e294a00871cbfc95bde082d0ac4ee284240a
                                                                                  • Instruction ID: 4c2bdaa4a0d053a9c2b07b2815e20e6ccbc3434d5eced6ebca9208880dc70881
                                                                                  • Opcode Fuzzy Hash: 65fbecc059460ab6d6c133513960e294a00871cbfc95bde082d0ac4ee284240a
                                                                                  • Instruction Fuzzy Hash: ACD28F73A0468581FB209B25E8543EAA369F7867D4F50423DDE4D577AAEF38CB4AC700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$DialogItemPathTemp
                                                                                  • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                                  • API String ID: 3007431893-3916287355
                                                                                  • Opcode ID: e02ea11f63ca83b0232798bb7bc92859ef05eb5995c48a6c2f1b98aa57d00e7c
                                                                                  • Instruction ID: 8ca0d947457a328bc1d53bf888adc71de7ccea23447eb9376dfa6de4a5f7b7f2
                                                                                  • Opcode Fuzzy Hash: e02ea11f63ca83b0232798bb7bc92859ef05eb5995c48a6c2f1b98aa57d00e7c
                                                                                  • Instruction Fuzzy Hash: 05137673B00B8089FB10DF64D8843DD67A9EB44798F90162ADE5D97AE9DF74C68AC340

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1466 13ff80754-13ff80829 call 13ff6dfd0 call 13ff662dc call 13ff7946c call 13ff83cf0 call 13ff79a14 1477 13ff8082b-13ff80840 1466->1477 1478 13ff80860-13ff80883 1466->1478 1479 13ff8085b call 13ff8220c 1477->1479 1480 13ff80842-13ff80855 1477->1480 1481 13ff808ba-13ff808dd 1478->1481 1482 13ff80885-13ff8089a 1478->1482 1479->1478 1480->1479 1483 13ff80ddd-13ff80de2 call 13ff87904 1480->1483 1487 13ff808df-13ff808f4 1481->1487 1488 13ff80914-13ff80937 1481->1488 1485 13ff8089c-13ff808af 1482->1485 1486 13ff808b5 call 13ff8220c 1482->1486 1502 13ff80de3-13ff80e2f call 13ff87904 call 13ff81900 1483->1502 1485->1483 1485->1486 1486->1481 1493 13ff8090f call 13ff8220c 1487->1493 1494 13ff808f6-13ff80909 1487->1494 1489 13ff80939-13ff8094e 1488->1489 1490 13ff8096e-13ff8097a GetCommandLineW 1488->1490 1496 13ff80969 call 13ff8220c 1489->1496 1497 13ff80950-13ff80963 1489->1497 1499 13ff80980-13ff809b7 call 13ff8797c call 13ff5129c call 13ff7cad0 1490->1499 1500 13ff80b47-13ff80b5e call 13ff66454 1490->1500 1493->1488 1494->1483 1494->1493 1496->1490 1497->1483 1497->1496 1527 13ff809b9-13ff809cc 1499->1527 1528 13ff809ec-13ff809f3 1499->1528 1508 13ff80b89-13ff80ce4 call 13ff51fa0 SetEnvironmentVariableW GetLocalTime call 13ff63e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 13ff7b014 call 13ff698ac call 13ff767b4 * 2 DialogBoxParamW call 13ff768a8 * 2 1500->1508 1509 13ff80b60-13ff80b85 call 13ff51fa0 call 13ff83640 1500->1509 1522 13ff80e34-13ff80e6a 1502->1522 1571 13ff80cec-13ff80cf3 1508->1571 1572 13ff80ce6 Sleep 1508->1572 1509->1508 1526 13ff80e6c 1522->1526 1526->1526 1532 13ff809ce-13ff809e1 1527->1532 1533 13ff809e7 call 13ff8220c 1527->1533 1529 13ff809f9-13ff80a13 OpenFileMappingW 1528->1529 1530 13ff80adb-13ff80b12 call 13ff8797c call 13ff5129c call 13ff7fd0c 1528->1530 1536 13ff80a19-13ff80a39 MapViewOfFile 1529->1536 1537 13ff80ad0-13ff80ad9 CloseHandle 1529->1537 1530->1500 1555 13ff80b14-13ff80b27 1530->1555 1532->1502 1532->1533 1533->1528 1536->1537 1540 13ff80a3f-13ff80a6f UnmapViewOfFile MapViewOfFile 1536->1540 1537->1500 1540->1537 1543 13ff80a71-13ff80aca call 13ff7a190 call 13ff7fd0c call 13ff6b9b4 call 13ff6bb00 call 13ff6bb70 UnmapViewOfFile 1540->1543 1543->1537 1558 13ff80b29-13ff80b3c 1555->1558 1559 13ff80b42 call 13ff8220c 1555->1559 1558->1559 1562 13ff80dd7-13ff80ddc call 13ff87904 1558->1562 1559->1500 1562->1483 1575 13ff80cfa-13ff80d1d call 13ff6b8e0 DeleteObject 1571->1575 1576 13ff80cf5 call 13ff79f4c 1571->1576 1572->1571 1580 13ff80d1f DeleteObject 1575->1580 1581 13ff80d25-13ff80d2c 1575->1581 1576->1575 1580->1581 1582 13ff80d2e-13ff80d35 1581->1582 1583 13ff80d48-13ff80d59 1581->1583 1582->1583 1584 13ff80d37-13ff80d43 call 13ff5ba0c 1582->1584 1585 13ff80d5b-13ff80d67 call 13ff7fe24 CloseHandle 1583->1585 1586 13ff80d6d-13ff80d7a 1583->1586 1584->1583 1585->1586 1589 13ff80d7c-13ff80d89 1586->1589 1590 13ff80d9f-13ff80da4 call 13ff794e4 1586->1590 1592 13ff80d99-13ff80d9b 1589->1592 1593 13ff80d8b-13ff80d93 1589->1593 1597 13ff80da9-13ff80dd6 call 13ff82320 1590->1597 1592->1590 1596 13ff80d9d 1592->1596 1593->1590 1595 13ff80d95-13ff80d97 1593->1595 1595->1590 1596->1590
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                  • API String ID: 1048086575-3710569615
                                                                                  • Opcode ID: a8dee53382f89b6e08e422cbf5d41e0c5acc1e70b6aec1bd7dd538d57bc5f32c
                                                                                  • Instruction ID: a3922a514e940d71d9767af06005d2f1b2a53583f79057f4a2ecc49c07f1debd
                                                                                  • Opcode Fuzzy Hash: a8dee53382f89b6e08e422cbf5d41e0c5acc1e70b6aec1bd7dd538d57bc5f32c
                                                                                  • Instruction Fuzzy Hash: 5A12AD73A10B8582FB10DF24E8453E967A9FB84794F804239DE9D56BA6EF78C746C700

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1871 13ff6a4ac-13ff6a52e call 13ff63e28 call 13ff70f68 call 13ff879b0 1878 13ff6a530 1871->1878 1879 13ff6a589-13ff6a5fd call 13ff69408 GetWindowRect GetClientRect 1871->1879 1881 13ff6a537-13ff6a53a 1878->1881 1885 13ff6a603-13ff6a606 1879->1885 1886 13ff6a6f2-13ff6a717 GetSystemMetrics GetWindow 1879->1886 1883 13ff6a53c-13ff6a54e call 13ff8a820 1881->1883 1884 13ff6a579-13ff6a587 1881->1884 1883->1884 1896 13ff6a550-13ff6a568 call 13ff69800 1883->1896 1884->1879 1884->1881 1888 13ff6a6c2-13ff6a6e3 call 13ff695a8 1885->1888 1889 13ff6a60c-13ff6a6bd GetWindowLongPtrW call 13ffbe2c0 GetWindowRect 1885->1889 1891 13ff6a821-13ff6a84a call 13ff82320 1886->1891 1892 13ff6a71d-13ff6a722 1886->1892 1888->1886 1904 13ff6a6e5-13ff6a6ec SetWindowTextW 1888->1904 1889->1888 1892->1891 1897 13ff6a728-13ff6a72c 1892->1897 1896->1884 1907 13ff6a56a-13ff6a573 SetDlgItemTextW 1896->1907 1902 13ff6a732-13ff6a738 1897->1902 1902->1891 1903 13ff6a73e-13ff6a814 GetWindowRect call 13ffbe2c0 GetWindow 1902->1903 1903->1891 1909 13ff6a816-13ff6a81b 1903->1909 1904->1886 1907->1884 1909->1891 1909->1902
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                                                  • String ID: $%s:$CAPTION
                                                                                  • API String ID: 2100155373-404845831
                                                                                  • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                  • Instruction ID: e7168309f5315eb53625c5c1a421cb0b69e5d274aefa6e2c208e14e00312e26e
                                                                                  • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                  • Instruction Fuzzy Hash: 9F91F533B2465486E718CF39E80079AB7A5F785B84F445529EE4A57B98CF3CDE06CB00

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1963 13ff78624-13ff78649 FindResourceW 1964 13ff787a2 1963->1964 1965 13ff7864f-13ff78663 SizeofResource 1963->1965 1967 13ff787a4-13ff787ab 1964->1967 1965->1964 1966 13ff78669-13ff7867c LoadResource 1965->1966 1966->1964 1968 13ff78682-13ff78691 LockResource 1966->1968 1968->1964 1969 13ff78697-13ff786b2 GlobalAlloc 1968->1969 1970 13ff786b8-13ff786c4 GlobalLock 1969->1970 1971 13ff7879b-13ff787a0 1969->1971 1972 13ff78792-13ff78795 GlobalFree 1970->1972 1973 13ff786ca-13ff786f0 call 13ff83640 CreateStreamOnHGlobal 1970->1973 1971->1967 1972->1971 1976 13ff786f6-13ff78709 GdipAlloc 1973->1976 1977 13ff78789-13ff7878c GlobalUnlock 1973->1977 1978 13ff78736 1976->1978 1979 13ff7870b-13ff78723 call 13ff821b5 1976->1979 1977->1972 1980 13ff78738-13ff7874d 1978->1980 1982 13ff78728-13ff78734 1979->1982 1980->1977 1984 13ff7874f-13ff78758 1980->1984 1982->1980 1985 13ff78775-13ff78780 1984->1985 1986 13ff7875a-13ff78770 GdipCreateHBITMAPFromBitmap 1984->1986 1985->1977 1986->1985 1987 13ff78772 1986->1987 1987->1985
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                  • String ID: PNG
                                                                                  • API String ID: 211097158-364855578
                                                                                  • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                  • Instruction ID: 7796401dbb0ed43758eadfa451cec2f048364635eaaf3a2437499e19f0a44f57
                                                                                  • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                  • Instruction Fuzzy Hash: 4F411037A11B4582FF149F16D9543A9A7A8AB88BD4F544439CE0A87764EF78C64BC700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: __tmp_reference_source_
                                                                                  • API String ID: 3668304517-685763994
                                                                                  • Opcode ID: b28ddd4369ee9d2fb9f54b960e8e8661f54215d7ba7c365575bd3731626fabcc
                                                                                  • Instruction ID: 63b5ba0cfae9e0acdec579c33fec11094c6b2e34b8abc651685b4cd32d699868
                                                                                  • Opcode Fuzzy Hash: b28ddd4369ee9d2fb9f54b960e8e8661f54215d7ba7c365575bd3731626fabcc
                                                                                  • Instruction Fuzzy Hash: 7DE2CF73A046C092EE64DB35E1843DEA7A9F781BA4F50412ADF9D03AE6CF78D656C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: CMT
                                                                                  • API String ID: 3668304517-2756464174
                                                                                  • Opcode ID: 4e0d3519dbc53a17a318317a6bcad5245a825900c95476f602d2745d5873cb12
                                                                                  • Instruction ID: c80235e82157f7c96e878909b241bc44f6ad9feaec25930ab30c7778effa0331
                                                                                  • Opcode Fuzzy Hash: 4e0d3519dbc53a17a318317a6bcad5245a825900c95476f602d2745d5873cb12
                                                                                  • Instruction Fuzzy Hash: 6EE20C33B00A8086EB28DB75D5683EE67A9F745798F48003ADE5E47B96DF38D656C300

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3476 13ff640bc-13ff640f3 3477 13ff641d2-13ff641df FindNextFileW 3476->3477 3478 13ff640f9-13ff64101 3476->3478 3481 13ff641f3-13ff641f6 3477->3481 3482 13ff641e1-13ff641f1 GetLastError 3477->3482 3479 13ff64106-13ff64118 FindFirstFileW 3478->3479 3480 13ff64103 3478->3480 3479->3481 3483 13ff6411e-13ff64146 call 13ff66a0c 3479->3483 3480->3479 3485 13ff641f8-13ff64200 3481->3485 3486 13ff64211-13ff64253 call 13ff8797c call 13ff5129c call 13ff68090 3481->3486 3484 13ff641ca-13ff641cd 3482->3484 3496 13ff64167-13ff64170 3483->3496 3497 13ff64148-13ff64164 FindFirstFileW 3483->3497 3488 13ff642eb-13ff6430e call 13ff82320 3484->3488 3490 13ff64205-13ff6420c call 13ff520b0 3485->3490 3491 13ff64202 3485->3491 3512 13ff64255-13ff6426c 3486->3512 3513 13ff6428c-13ff642e6 call 13ff6f168 * 3 3486->3513 3490->3486 3491->3490 3500 13ff64172-13ff64189 3496->3500 3501 13ff641a9-13ff641ad 3496->3501 3497->3496 3503 13ff641a4 call 13ff8220c 3500->3503 3504 13ff6418b-13ff6419e 3500->3504 3501->3481 3505 13ff641af-13ff641be GetLastError 3501->3505 3503->3501 3504->3503 3507 13ff64315-13ff6431b call 13ff87904 3504->3507 3509 13ff641c8 3505->3509 3510 13ff641c0-13ff641c6 3505->3510 3509->3484 3510->3484 3510->3509 3515 13ff64287 call 13ff8220c 3512->3515 3516 13ff6426e-13ff64281 3512->3516 3513->3488 3515->3513 3516->3515 3519 13ff6430f-13ff64314 call 13ff87904 3516->3519 3519->3507
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                                  • String ID:
                                                                                  • API String ID: 474548282-0
                                                                                  • Opcode ID: 3558f315e1be10042476175db8ede7ee76fa75e1d5bd3181acd8c5a3a8ae59ff
                                                                                  • Instruction ID: 0da8c72e8fba7f6f4094cb8d0c44c4d2f825cd0c8c3d7267ef2e6745e3c75b18
                                                                                  • Opcode Fuzzy Hash: 3558f315e1be10042476175db8ede7ee76fa75e1d5bd3181acd8c5a3a8ae59ff
                                                                                  • Instruction Fuzzy Hash: EF61A273A04A8481EA10DF28E8453DE6369F795BB4F505329EEAD03BD9DF78C686C700

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3636 13ff55e24-13ff56129 call 13ff6833c call 13ff685f0 3642 13ff5612e-13ff56132 3636->3642 3643 13ff56141-13ff56171 call 13ff683d8 call 13ff68570 call 13ff68528 3642->3643 3644 13ff56134-13ff5613c call 13ff56fcc 3642->3644 3662 13ff56177-13ff56179 3643->3662 3663 13ff56973-13ff56976 call 13ff5466c 3643->3663 3650 13ff5697b 3644->3650 3652 13ff5697e-13ff56985 3650->3652 3654 13ff56987-13ff56998 3652->3654 3655 13ff569b4-13ff569e3 call 13ff82320 3652->3655 3656 13ff569af call 13ff8220c 3654->3656 3657 13ff5699a-13ff569ad 3654->3657 3656->3655 3657->3656 3660 13ff569e4-13ff569e9 call 13ff87904 3657->3660 3671 13ff569ea-13ff569ef call 13ff87904 3660->3671 3662->3663 3665 13ff5617f-13ff56189 3662->3665 3663->3650 3665->3663 3668 13ff5618f-13ff56192 3665->3668 3668->3663 3670 13ff56198-13ff561aa call 13ff685f0 3668->3670 3670->3644 3676 13ff561ac-13ff561fd call 13ff684f8 call 13ff68528 * 2 3670->3676 3677 13ff569f0-13ff569f7 call 13ff87904 3671->3677 3686 13ff5623f-13ff56249 3676->3686 3687 13ff561ff-13ff56222 call 13ff5466c call 13ff5ba0c 3676->3687 3689 13ff56266-13ff56270 3686->3689 3690 13ff5624b-13ff56260 call 13ff68528 3686->3690 3687->3686 3704 13ff56224-13ff5622e call 13ff5433c 3687->3704 3693 13ff56272-13ff5627b call 13ff68528 3689->3693 3694 13ff5627e-13ff56296 call 13ff5334c 3689->3694 3690->3663 3690->3689 3693->3694 3702 13ff56298-13ff5629b 3694->3702 3703 13ff562b3 3694->3703 3702->3703 3705 13ff5629d-13ff562b1 3702->3705 3706 13ff562b6-13ff562c8 3703->3706 3704->3686 3705->3703 3705->3706 3708 13ff568b7-13ff56929 call 13ff64d04 call 13ff68528 3706->3708 3709 13ff562ce-13ff562d1 3706->3709 3726 13ff56936 3708->3726 3727 13ff5692b-13ff56934 call 13ff68528 3708->3727 3710 13ff562d7-13ff562da 3709->3710 3711 13ff56481-13ff564f4 call 13ff64c74 call 13ff68528 * 2 3709->3711 3710->3711 3713 13ff562e0-13ff562e3 3710->3713 3743 13ff564f6-13ff56500 3711->3743 3744 13ff56507-13ff56533 call 13ff68528 3711->3744 3716 13ff562e5-13ff562e8 3713->3716 3717 13ff5632e-13ff56353 call 13ff68528 3713->3717 3720 13ff562ee-13ff56329 call 13ff68528 3716->3720 3721 13ff5696d-13ff56971 3716->3721 3730 13ff56355-13ff5638f call 13ff54228 call 13ff53c84 call 13ff5701c call 13ff51fa0 3717->3730 3731 13ff5639e-13ff563c5 call 13ff68528 call 13ff68384 3717->3731 3720->3721 3721->3652 3733 13ff56939-13ff56946 3726->3733 3727->3733 3781 13ff56390-13ff56399 call 13ff51fa0 3730->3781 3755 13ff563c7-13ff56400 call 13ff54228 call 13ff53c84 call 13ff5701c call 13ff51fa0 3731->3755 3756 13ff56402-13ff5641f call 13ff68444 3731->3756 3738 13ff56948-13ff5694a 3733->3738 3739 13ff5694c 3733->3739 3738->3739 3746 13ff5694f-13ff56959 3738->3746 3739->3746 3743->3744 3757 13ff56535-13ff56544 call 13ff683d8 call 13ff6f134 3744->3757 3758 13ff56549-13ff56557 3744->3758 3746->3721 3750 13ff5695b-13ff56968 call 13ff54840 3746->3750 3750->3721 3755->3781 3777 13ff56475-13ff5647c 3756->3777 3778 13ff56421-13ff5646f call 13ff68444 * 2 call 13ff6c800 call 13ff84a70 3756->3778 3757->3758 3763 13ff56572-13ff56595 call 13ff68528 3758->3763 3764 13ff56559-13ff5656c call 13ff683d8 3758->3764 3782 13ff56597-13ff5659e 3763->3782 3783 13ff565a0-13ff565b0 3763->3783 3764->3763 3777->3721 3778->3777 3781->3731 3784 13ff565b3-13ff565eb call 13ff68528 * 2 3782->3784 3783->3784 3800 13ff565f6-13ff565fa 3784->3800 3801 13ff565ed-13ff565f4 3784->3801 3803 13ff56603-13ff56632 3800->3803 3805 13ff565fc 3800->3805 3801->3803 3806 13ff56634-13ff56638 3803->3806 3807 13ff5663f 3803->3807 3805->3803 3806->3807 3808 13ff5663a-13ff5663d 3806->3808 3809 13ff56641-13ff56656 3807->3809 3808->3809 3810 13ff56658-13ff5665b 3809->3810 3811 13ff566ca 3809->3811 3810->3811 3813 13ff5665d-13ff56683 3810->3813 3812 13ff566d2-13ff56731 call 13ff53d00 call 13ff68444 call 13ff70d54 3811->3812 3824 13ff56745-13ff56749 3812->3824 3825 13ff56733-13ff56740 call 13ff54840 3812->3825 3813->3812 3814 13ff56685-13ff566a9 3813->3814 3816 13ff566b2-13ff566bf 3814->3816 3817 13ff566ab 3814->3817 3816->3812 3819 13ff566c1-13ff566c8 3816->3819 3817->3816 3819->3812 3827 13ff5675b-13ff56772 call 13ff8797c 3824->3827 3828 13ff5674b-13ff56756 call 13ff5473c 3824->3828 3825->3824 3834 13ff56777-13ff5677e 3827->3834 3835 13ff56774 3827->3835 3833 13ff56859-13ff56860 3828->3833 3836 13ff56862-13ff56872 call 13ff5433c 3833->3836 3837 13ff56873-13ff5687b 3833->3837 3838 13ff567a3-13ff567ba call 13ff8797c 3834->3838 3839 13ff56780-13ff56783 3834->3839 3835->3834 3836->3837 3837->3721 3841 13ff56881-13ff56892 3837->3841 3852 13ff567bf-13ff567c6 3838->3852 3853 13ff567bc 3838->3853 3842 13ff56785 3839->3842 3843 13ff5679c 3839->3843 3846 13ff56894-13ff568a7 3841->3846 3847 13ff568ad-13ff568b2 call 13ff8220c 3841->3847 3848 13ff56788-13ff56791 3842->3848 3843->3838 3846->3677 3846->3847 3847->3721 3848->3838 3851 13ff56793-13ff5679a 3848->3851 3851->3843 3851->3848 3852->3833 3854 13ff567cc-13ff567cf 3852->3854 3853->3852 3856 13ff567e8-13ff567f0 3854->3856 3857 13ff567d1 3854->3857 3856->3833 3859 13ff567f2-13ff56826 call 13ff68360 call 13ff68598 call 13ff68528 3856->3859 3858 13ff567d4-13ff567dd 3857->3858 3858->3833 3860 13ff567df-13ff567e6 3858->3860 3859->3833 3867 13ff56828-13ff56839 3859->3867 3860->3856 3860->3858 3868 13ff56854 call 13ff8220c 3867->3868 3869 13ff5683b-13ff5684e 3867->3869 3868->3833 3869->3671 3869->3868
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CMT
                                                                                  • API String ID: 0-2756464174
                                                                                  • Opcode ID: 47cd3b120c54ed8ca83a83c160b6bdeeb0161c1da1c2dba66732434d3e775dd7
                                                                                  • Instruction ID: d7ec0ce94c64852a11dfa8621b1e425c66420ab3204ba5dc5397eff8ce19ad1d
                                                                                  • Opcode Fuzzy Hash: 47cd3b120c54ed8ca83a83c160b6bdeeb0161c1da1c2dba66732434d3e775dd7
                                                                                  • Instruction Fuzzy Hash: C142D933B00A809AEB18DB74C2583ED77A9E751798F40013ADF6E57696DF34EA5AC300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled_invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 59578552-0
                                                                                  • Opcode ID: 5e8e7c2eab798a38dfb3fde06ce0d0a0e1510679a82775c568ee565f78a798df
                                                                                  • Instruction ID: e3768da98b353e7c1626f9dbd642a59ded28267fafb117eb9fa218d452db79b3
                                                                                  • Opcode Fuzzy Hash: 5e8e7c2eab798a38dfb3fde06ce0d0a0e1510679a82775c568ee565f78a798df
                                                                                  • Instruction Fuzzy Hash: 7DE01237E15175C6F61C37765C823DC1CD96B85320F60023DEA1D453C2CA690793AA62
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4f290487e5a667d54cc41a5d187d2fad0533435d196c5144e63478bd963f0733
                                                                                  • Instruction ID: efe7cfbcf58a9fcc2210e7fe055d5492e488a73f0819f3a0581692dd179713ef
                                                                                  • Opcode Fuzzy Hash: 4f290487e5a667d54cc41a5d187d2fad0533435d196c5144e63478bd963f0733
                                                                                  • Instruction Fuzzy Hash: 9EE1D273A04A808AFB64CF29A044BEDBBA5F344788F15413DDF8A97785DB38D64AC704
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8c3f9089be966249862bf56ce032710d6eb03eb50aa34be6e58aa05575d530c2
                                                                                  • Instruction ID: 10d92c0dd7f976ed2b31ac555d6e99644d031d3c076dcea7c68c72ffa7de8a92
                                                                                  • Opcode Fuzzy Hash: 8c3f9089be966249862bf56ce032710d6eb03eb50aa34be6e58aa05575d530c2
                                                                                  • Instruction Fuzzy Hash: 69B1B0B3B01BD8A2EE58DA66D608BD9A399F345FC4F48803ADE5D47745DB38D25AC300
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                  • String ID:
                                                                                  • API String ID: 3340455307-0
                                                                                  • Opcode ID: 351ceed20d24346c920f2b33a82c7c15764e1b5f9a2ac08ee0b3c21e451927ce
                                                                                  • Instruction ID: db50890ff30bf453ca7f57b4d861b73beaab12e46f635d0afc9cd640dc03751e
                                                                                  • Opcode Fuzzy Hash: 351ceed20d24346c920f2b33a82c7c15764e1b5f9a2ac08ee0b3c21e451927ce
                                                                                  • Instruction Fuzzy Hash: CF413733B11E9086FB68EF32E940B9A265AF3C4B98F1450389E4E07B95DE38D547C704

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 13ff6dfd0-13ff6e024 call 13ff82450 GetModuleHandleW 3 13ff6e026-13ff6e039 GetProcAddress 0->3 4 13ff6e07b-13ff6e3a5 0->4 5 13ff6e053-13ff6e066 GetProcAddress 3->5 6 13ff6e03b-13ff6e04a 3->6 7 13ff6e503-13ff6e521 call 13ff66454 call 13ff67df4 4->7 8 13ff6e3ab-13ff6e3b4 call 13ff8b788 4->8 5->4 10 13ff6e068-13ff6e078 5->10 6->5 19 13ff6e525-13ff6e52f call 13ff651a4 7->19 8->7 16 13ff6e3ba-13ff6e3fd call 13ff66454 CreateFileW 8->16 10->4 22 13ff6e403-13ff6e416 SetFilePointer 16->22 23 13ff6e4f0-13ff6e4fe CloseHandle call 13ff51fa0 16->23 28 13ff6e564-13ff6e5ac call 13ff8797c call 13ff5129c call 13ff68090 call 13ff51fa0 call 13ff632bc 19->28 29 13ff6e531-13ff6e53c call 13ff6dd88 19->29 22->23 24 13ff6e41c-13ff6e43e ReadFile 22->24 23->7 24->23 27 13ff6e444-13ff6e452 24->27 30 13ff6e458-13ff6e4ac call 13ff8797c call 13ff5129c 27->30 31 13ff6e800-13ff6e807 call 13ff82624 27->31 69 13ff6e5b1-13ff6e5b4 28->69 29->28 41 13ff6e53e-13ff6e562 CompareStringW 29->41 49 13ff6e4c3-13ff6e4d9 call 13ff6d0a0 30->49 41->28 44 13ff6e5bd-13ff6e5c6 41->44 44->19 47 13ff6e5cc 44->47 50 13ff6e5d1-13ff6e5d4 47->50 63 13ff6e4ae-13ff6e4be call 13ff6dd88 49->63 64 13ff6e4db-13ff6e4eb call 13ff51fa0 * 2 49->64 53 13ff6e5d6-13ff6e5d9 50->53 54 13ff6e63f-13ff6e642 50->54 59 13ff6e5dd-13ff6e62d call 13ff8797c call 13ff5129c call 13ff68090 call 13ff51fa0 call 13ff632bc 53->59 57 13ff6e648-13ff6e65b call 13ff67eb0 call 13ff651a4 54->57 58 13ff6e7c2-13ff6e7ff call 13ff51fa0 * 2 call 13ff82320 54->58 82 13ff6e706-13ff6e753 call 13ff6da98 AllocConsole 57->82 83 13ff6e661-13ff6e701 call 13ff6dd88 * 2 call 13ff6aae0 call 13ff6da98 call 13ff6aae0 call 13ff6dc2c call 13ff787ac call 13ff519e0 57->83 107 13ff6e62f-13ff6e638 59->107 108 13ff6e63c 59->108 63->49 64->23 75 13ff6e5b6 69->75 76 13ff6e5ce 69->76 75->44 76->50 94 13ff6e755-13ff6e7aa GetCurrentProcessId AttachConsole call 13ff6e868 call 13ff6e858 GetStdHandle WriteConsoleW Sleep FreeConsole 82->94 95 13ff6e7b0 82->95 100 13ff6e7b4-13ff6e7bb call 13ff519e0 ExitProcess 83->100 94->95 95->100 107->59 112 13ff6e63a 107->112 108->54 112->54
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                                                  • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                                  • API String ID: 1496594111-2013832382
                                                                                  • Opcode ID: 468c4a7f069b7598ff125167d5f4f846522f64d48354b40e84144950afa66450
                                                                                  • Instruction ID: ecc4010a722c130b46c1003ef525dd6ef1d8273d34ff2755bbab5ffbc8bde686
                                                                                  • Opcode Fuzzy Hash: 468c4a7f069b7598ff125167d5f4f846522f64d48354b40e84144950afa66450
                                                                                  • Instruction Fuzzy Hash: F832FA37A01B8099EB219F64E8813DA33A8FB44758F91123ADE4D577A5EF38C756C740
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                                  • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                                  • API String ID: 3629253777-3268106645
                                                                                  • Opcode ID: 15c8a0442dfdb0da6b8bb8c321e22356c09d03479809fd76414af841d758a6b1
                                                                                  • Instruction ID: fbaee4b29ac38c23ac32f870a95ba0d28c9ef9143845198874a7ad69987c4434
                                                                                  • Opcode Fuzzy Hash: 15c8a0442dfdb0da6b8bb8c321e22356c09d03479809fd76414af841d758a6b1
                                                                                  • Instruction Fuzzy Hash: 9462BD33B11A8095EB20DF35D4883EE67A9F7507A8F80522ADE5A476D9EF39C746C340

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1910 13ff81900-13ff81989 call 13ff81558 1913 13ff8198b-13ff819af call 13ff81868 RaiseException 1910->1913 1914 13ff819b4-13ff819d1 1910->1914 1920 13ff81bb8-13ff81bd5 1913->1920 1916 13ff819d3-13ff819e4 1914->1916 1917 13ff819e6-13ff819ea 1914->1917 1919 13ff819ed-13ff819f9 1916->1919 1917->1919 1921 13ff81a1a-13ff81a1d 1919->1921 1922 13ff819fb-13ff81a0d 1919->1922 1923 13ff81a23-13ff81a26 1921->1923 1924 13ff81ac4-13ff81acb 1921->1924 1934 13ff81b89-13ff81b93 1922->1934 1935 13ff81a13 1922->1935 1928 13ff81a3d-13ff81a52 LoadLibraryExA 1923->1928 1929 13ff81a28-13ff81a3b 1923->1929 1926 13ff81acd-13ff81adc 1924->1926 1927 13ff81adf-13ff81ae2 1924->1927 1926->1927 1930 13ff81b85 1927->1930 1931 13ff81ae8-13ff81aec 1927->1931 1932 13ff81aa9-13ff81ab2 1928->1932 1933 13ff81a54-13ff81a67 GetLastError 1928->1933 1929->1928 1929->1932 1930->1934 1938 13ff81b1b-13ff81b2e GetProcAddress 1931->1938 1939 13ff81aee-13ff81af2 1931->1939 1944 13ff81abd 1932->1944 1945 13ff81ab4-13ff81ab7 FreeLibrary 1932->1945 1940 13ff81a69-13ff81a7c 1933->1940 1941 13ff81a7e-13ff81aa4 call 13ff81868 RaiseException 1933->1941 1942 13ff81bb0 call 13ff81868 1934->1942 1943 13ff81b95-13ff81ba6 1934->1943 1935->1921 1938->1930 1949 13ff81b30-13ff81b43 GetLastError 1938->1949 1939->1938 1946 13ff81af4-13ff81aff 1939->1946 1940->1932 1940->1941 1941->1920 1952 13ff81bb5 1942->1952 1943->1942 1944->1924 1945->1944 1946->1938 1950 13ff81b01-13ff81b08 1946->1950 1954 13ff81b5a-13ff81b81 call 13ff81868 RaiseException call 13ff81558 1949->1954 1955 13ff81b45-13ff81b58 1949->1955 1950->1938 1956 13ff81b0a-13ff81b0f 1950->1956 1952->1920 1954->1930 1955->1930 1955->1954 1956->1938 1958 13ff81b11-13ff81b19 1956->1958 1958->1930 1958->1938
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                                                  • String ID: H
                                                                                  • API String ID: 3432403771-2852464175
                                                                                  • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                  • Instruction ID: 0e0e9927a72fbc47ccf18a58c2b210060b6c5e299e54f5edf2530daae9eb9b20
                                                                                  • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                  • Instruction Fuzzy Hash: 5B911533B01B608AEB50DFA5D9847D937A9FB08B98F494639DE0917B68EB34D646C340

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1988 13ff7f4e0-13ff7f523 1989 13ff7f894-13ff7f8b9 call 13ff51fa0 call 13ff82320 1988->1989 1990 13ff7f529-13ff7f565 call 13ff83cf0 1988->1990 1996 13ff7f567 1990->1996 1997 13ff7f56a-13ff7f571 1990->1997 1996->1997 1999 13ff7f573-13ff7f577 1997->1999 2000 13ff7f582-13ff7f586 1997->2000 2003 13ff7f57c-13ff7f580 1999->2003 2004 13ff7f579 1999->2004 2001 13ff7f588 2000->2001 2002 13ff7f58b-13ff7f596 2000->2002 2001->2002 2005 13ff7f628 2002->2005 2006 13ff7f59c 2002->2006 2003->2002 2004->2003 2008 13ff7f62c-13ff7f62f 2005->2008 2007 13ff7f5a2-13ff7f5a9 2006->2007 2009 13ff7f5ae-13ff7f5b3 2007->2009 2010 13ff7f5ab 2007->2010 2011 13ff7f637-13ff7f63a 2008->2011 2012 13ff7f631-13ff7f635 2008->2012 2013 13ff7f5e5-13ff7f5f0 2009->2013 2014 13ff7f5b5 2009->2014 2010->2009 2015 13ff7f660-13ff7f673 call 13ff663ac 2011->2015 2016 13ff7f63c-13ff7f643 2011->2016 2012->2011 2012->2015 2017 13ff7f5f5-13ff7f5fa 2013->2017 2018 13ff7f5f2 2013->2018 2019 13ff7f5ca-13ff7f5d0 2014->2019 2033 13ff7f698-13ff7f6ed call 13ff8797c call 13ff5129c call 13ff632a8 call 13ff51fa0 2015->2033 2034 13ff7f675-13ff7f693 call 13ff713c4 2015->2034 2016->2015 2020 13ff7f645-13ff7f65c 2016->2020 2022 13ff7f600-13ff7f607 2017->2022 2023 13ff7f8ba-13ff7f8c1 2017->2023 2018->2017 2024 13ff7f5b7-13ff7f5be 2019->2024 2025 13ff7f5d2 2019->2025 2020->2015 2027 13ff7f60c-13ff7f612 2022->2027 2028 13ff7f609 2022->2028 2031 13ff7f8c6-13ff7f8cb 2023->2031 2032 13ff7f8c3 2023->2032 2029 13ff7f5c3-13ff7f5c8 2024->2029 2030 13ff7f5c0 2024->2030 2025->2013 2027->2023 2037 13ff7f618-13ff7f622 2027->2037 2028->2027 2029->2019 2038 13ff7f5d4-13ff7f5db 2029->2038 2030->2029 2039 13ff7f8de-13ff7f8e6 2031->2039 2040 13ff7f8cd-13ff7f8d4 2031->2040 2032->2031 2055 13ff7f742-13ff7f74f ShellExecuteExW 2033->2055 2056 13ff7f6ef-13ff7f73d call 13ff8797c call 13ff5129c call 13ff65b60 call 13ff51fa0 2033->2056 2034->2033 2037->2005 2037->2007 2045 13ff7f5e0 2038->2045 2046 13ff7f5dd 2038->2046 2042 13ff7f8e8 2039->2042 2043 13ff7f8eb-13ff7f8f6 2039->2043 2047 13ff7f8d6 2040->2047 2048 13ff7f8d9 2040->2048 2042->2043 2043->2008 2045->2013 2046->2045 2047->2048 2048->2039 2057 13ff7f846-13ff7f84e 2055->2057 2058 13ff7f755-13ff7f75f 2055->2058 2056->2055 2060 13ff7f882-13ff7f88f 2057->2060 2061 13ff7f850-13ff7f866 2057->2061 2062 13ff7f761-13ff7f764 2058->2062 2063 13ff7f76f-13ff7f772 2058->2063 2060->1989 2065 13ff7f868-13ff7f87b 2061->2065 2066 13ff7f87d call 13ff8220c 2061->2066 2062->2063 2067 13ff7f766-13ff7f76d 2062->2067 2068 13ff7f774-13ff7f77f call 13ffbe188 2063->2068 2069 13ff7f78e-13ff7f7ad call 13ffbe1b8 call 13ff7fe24 2063->2069 2065->2066 2071 13ff7f8fb-13ff7f903 call 13ff87904 2065->2071 2066->2060 2067->2063 2073 13ff7f7e3-13ff7f7f0 CloseHandle 2067->2073 2068->2069 2089 13ff7f781-13ff7f78c ShowWindow 2068->2089 2069->2073 2095 13ff7f7af-13ff7f7b2 2069->2095 2079 13ff7f805-13ff7f80c 2073->2079 2080 13ff7f7f2-13ff7f803 call 13ff713c4 2073->2080 2087 13ff7f82e-13ff7f830 2079->2087 2088 13ff7f80e-13ff7f811 2079->2088 2080->2079 2080->2087 2087->2057 2094 13ff7f832-13ff7f835 2087->2094 2088->2087 2093 13ff7f813-13ff7f828 2088->2093 2089->2069 2093->2087 2094->2057 2097 13ff7f837-13ff7f845 ShowWindow 2094->2097 2095->2073 2098 13ff7f7b4-13ff7f7c5 GetExitCodeProcess 2095->2098 2097->2057 2098->2073 2099 13ff7f7c7-13ff7f7dc 2098->2099 2099->2073
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: .exe$.inf$Install$p
                                                                                  • API String ID: 1054546013-3607691742
                                                                                  • Opcode ID: e6df9d24348bb93514fb480ea1be33c8dcd4460610e8708733d7670b1b277d8e
                                                                                  • Instruction ID: 9784dd94c9bab6573bd6ba762e09e2399b6028871234c1a2bf5916d0feacd12d
                                                                                  • Opcode Fuzzy Hash: e6df9d24348bb93514fb480ea1be33c8dcd4460610e8708733d7670b1b277d8e
                                                                                  • Instruction Fuzzy Hash: B5C19F73F1460095FB00DB25D9443E9A7B9A789BC4F044139DE5A87BE5EB38CA5BC344

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3569833718-0
                                                                                  • Opcode ID: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                                                                  • Instruction ID: 67c218186dfcd82f827fc9483bfeff791cf932601903732cc2123b6c926e302c
                                                                                  • Opcode Fuzzy Hash: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                                                                  • Instruction Fuzzy Hash: 9341AD33B10A4486F714CF61E814BDA2764E389BDCF481139DE1617B95CF7DCA4A8744
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 0144bcc994d84486ee27bbb6ec5de5de067ba5895e62caa73601afb15b6542e9
                                                                                  • Instruction ID: eeeba3dfb729e99330ba74db510307c74849fc076b687f04c29ca54b3cbb4ed9
                                                                                  • Opcode Fuzzy Hash: 0144bcc994d84486ee27bbb6ec5de5de067ba5895e62caa73601afb15b6542e9
                                                                                  • Instruction Fuzzy Hash: 1C128B73F10B40C5FB10DB65D4483ED27AAA7857A8F50426ADE5D17AEADF38C68AC340

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3527 13ff872ec-13ff8732a 3528 13ff8741b 3527->3528 3529 13ff87330-13ff87333 3527->3529 3531 13ff8741d-13ff87439 3528->3531 3530 13ff87339 3529->3530 3529->3531 3532 13ff8733c 3530->3532 3533 13ff87342-13ff87351 3532->3533 3534 13ff87413 3532->3534 3535 13ff8735e-13ff8737d LoadLibraryExW 3533->3535 3536 13ff87353-13ff87356 3533->3536 3534->3528 3539 13ff8737f-13ff87388 GetLastError 3535->3539 3540 13ff873d5-13ff873ea 3535->3540 3537 13ff8735c 3536->3537 3538 13ff873f5-13ff87404 GetProcAddress 3536->3538 3543 13ff873c9-13ff873d0 3537->3543 3538->3534 3542 13ff87406-13ff87411 3538->3542 3544 13ff8738a-13ff8739f call 13ff8a1fc 3539->3544 3545 13ff873b7-13ff873c1 3539->3545 3540->3538 3541 13ff873ec-13ff873ef FreeLibrary 3540->3541 3541->3538 3542->3531 3543->3532 3544->3545 3548 13ff873a1-13ff873b5 LoadLibraryExW 3544->3548 3545->3543 3548->3540 3548->3545
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,000000013FF874F3,?,?,?,000000013FF8525E,?,?,?,000000013FF85219), ref: 000000013FF87371
                                                                                  • GetLastError.KERNEL32(?,?,00000000,000000013FF874F3,?,?,?,000000013FF8525E,?,?,?,000000013FF85219), ref: 000000013FF8737F
                                                                                  • LoadLibraryExW.KERNEL32(?,?,00000000,000000013FF874F3,?,?,?,000000013FF8525E,?,?,?,000000013FF85219), ref: 000000013FF873A9
                                                                                  • FreeLibrary.KERNEL32(?,?,00000000,000000013FF874F3,?,?,?,000000013FF8525E,?,?,?,000000013FF85219), ref: 000000013FF873EF
                                                                                  • GetProcAddress.KERNEL32(?,?,00000000,000000013FF874F3,?,?,?,000000013FF8525E,?,?,?,000000013FF85219), ref: 000000013FF873FB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                  • String ID: api-ms-
                                                                                  • API String ID: 2559590344-2084034818
                                                                                  • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                  • Instruction ID: aef943ec18d7a022ab685c82bfe9b44b46f62331a9ecc246e5a28f75c0a9682e
                                                                                  • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                  • Instruction Fuzzy Hash: 2231E633B16660D1EE11DB16A8407DA2B9CFB48BA0F59453DDD1D5B394DF38C246C710

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3549 13ff624c0-13ff624fb 3550 13ff62506 3549->3550 3551 13ff624fd-13ff62504 3549->3551 3552 13ff62509-13ff62578 3550->3552 3551->3550 3551->3552 3553 13ff6257d-13ff625a8 CreateFileW 3552->3553 3554 13ff6257a 3552->3554 3555 13ff62688-13ff6268d 3553->3555 3556 13ff625ae-13ff625de GetLastError call 13ff66a0c 3553->3556 3554->3553 3558 13ff62693-13ff62697 3555->3558 3565 13ff625e0-13ff6262a CreateFileW GetLastError 3556->3565 3566 13ff6262c 3556->3566 3559 13ff626a5-13ff626a9 3558->3559 3560 13ff62699-13ff6269c 3558->3560 3563 13ff626cf-13ff626e3 3559->3563 3564 13ff626ab-13ff626af 3559->3564 3560->3559 3562 13ff6269e 3560->3562 3562->3559 3568 13ff626e5-13ff626f0 3563->3568 3569 13ff6270c-13ff62735 call 13ff82320 3563->3569 3564->3563 3567 13ff626b1-13ff626c9 SetFileTime 3564->3567 3570 13ff62632-13ff6263a 3565->3570 3566->3570 3567->3563 3571 13ff62708 3568->3571 3572 13ff626f2-13ff626fa 3568->3572 3573 13ff62673-13ff62686 3570->3573 3574 13ff6263c-13ff62653 3570->3574 3571->3569 3576 13ff626ff-13ff62703 call 13ff520b0 3572->3576 3577 13ff626fc 3572->3577 3573->3558 3578 13ff62655-13ff62668 3574->3578 3579 13ff6266e call 13ff8220c 3574->3579 3576->3571 3577->3576 3578->3579 3582 13ff62736-13ff6273b call 13ff87904 3578->3582 3579->3573
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3536497005-0
                                                                                  • Opcode ID: c90d99a879dbc59780aaf31344be960bf5048a79d4b9b92666a592f6816938e3
                                                                                  • Instruction ID: e5ba817cf6ee884bce7ad8d27c6961b04448c14dd904812ac0820e9e622f502c
                                                                                  • Opcode Fuzzy Hash: c90d99a879dbc59780aaf31344be960bf5048a79d4b9b92666a592f6816938e3
                                                                                  • Instruction Fuzzy Hash: 9F619377A1068085EB208F39E54439E67B5F3857B8F101328DFA907AE9DF39C69AC744

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3586 13ff7b014-13ff7b03c LoadBitmapW 3587 13ff7b03e-13ff7b041 call 13ff78624 3586->3587 3588 13ff7b049-13ff7b04c 3586->3588 3593 13ff7b046 3587->3593 3589 13ff7b063-13ff7b06b 3588->3589 3590 13ff7b04e-13ff7b061 GetObjectW 3588->3590 3592 13ff7b073-13ff7b07a call 13ff7849c 3589->3592 3590->3592 3596 13ff7b0ce-13ff7b0db 3592->3596 3597 13ff7b07c-13ff7b07e 3592->3597 3593->3588 3598 13ff7b080-13ff7b090 call 13ff78624 3597->3598 3599 13ff7b09e-13ff7b0cb call 13ff78504 call 13ff784cc call 13ff78df4 DeleteObject 3597->3599 3598->3599 3604 13ff7b092-13ff7b09b DeleteObject 3598->3604 3599->3596 3604->3599
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$Resource$Object$AllocBitmapCreateDeleteGdipLoadLock$FindFreeFromSizeofStreamUnlock
                                                                                  • String ID: ]
                                                                                  • API String ID: 3561356813-3352871620
                                                                                  • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                  • Instruction ID: 2c29e9f91ef7409f66a9199dc0c0c9a16bf7593e9d5d0cee09f0e5430d76cb5f
                                                                                  • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                  • Instruction Fuzzy Hash: 9C118232B0564542FA649B22A6543E9D39AAB89BD4F18003C9E5D47B99DE2CDE0EC700

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3609 13ff8f414-13ff8f46a 3610 13ff8f470-13ff8f473 3609->3610 3611 13ff8f595 3609->3611 3612 13ff8f47d-13ff8f480 3610->3612 3613 13ff8f475-13ff8f478 3610->3613 3614 13ff8f597-13ff8f5b3 3611->3614 3615 13ff8f529 3612->3615 3616 13ff8f486-13ff8f494 3612->3616 3613->3614 3617 13ff8f52b-13ff8f52e 3615->3617 3618 13ff8f49d-13ff8f4bc LoadLibraryExW 3616->3618 3619 13ff8f496-13ff8f499 3616->3619 3620 13ff8f57a-13ff8f58d 3617->3620 3621 13ff8f530-13ff8f53f GetProcAddress 3617->3621 3624 13ff8f4de-13ff8f4e8 3618->3624 3625 13ff8f4be-13ff8f4c7 GetLastError 3618->3625 3622 13ff8f49b 3619->3622 3623 13ff8f515-13ff8f51c 3619->3623 3620->3611 3627 13ff8f541-13ff8f568 3621->3627 3628 13ff8f573 3621->3628 3629 13ff8f510-13ff8f513 3622->3629 3623->3616 3626 13ff8f522 3623->3626 3632 13ff8f4ea-13ff8f4f5 3624->3632 3633 13ff8f4f7-13ff8f505 3624->3633 3630 13ff8f4c9-13ff8f4da LoadLibraryExW 3625->3630 3631 13ff8f4dc 3625->3631 3626->3615 3627->3614 3628->3620 3629->3623 3634 13ff8f56a-13ff8f571 3629->3634 3630->3624 3631->3624 3632->3623 3633->3629 3635 13ff8f507-13ff8f50a FreeLibrary 3633->3635 3634->3617 3635->3629
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID:
                                                                                  • API String ID: 190572456-0
                                                                                  • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                  • Instruction ID: 614ce774dda921a1c2b430e7cb11cda12f46578b0e2e6dda20e61bee697399a0
                                                                                  • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                  • Instruction Fuzzy Hash: 8C410433B11A5089FE159F22A9447D66B9DB744FE0F09453EDE198F7D8EB38C6468300

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3871 13ff7ae1c-13ff7ae3a PeekMessageW 3872 13ff7ae80-13ff7ae84 3871->3872 3873 13ff7ae3c-13ff7ae59 GetMessageW 3871->3873 3874 13ff7ae5b-13ff7ae68 IsDialogMessageW 3873->3874 3875 13ff7ae6a-13ff7ae7a TranslateMessage DispatchMessageW 3873->3875 3874->3872 3874->3875 3875->3872
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DialogDispatchPeekTranslate
                                                                                  • String ID:
                                                                                  • API String ID: 1266772231-0
                                                                                  • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                  • Instruction ID: fa337473240bafa04711ee223e626318911efa9e421d0012b86ce6509aaf7eba
                                                                                  • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                  • Instruction Fuzzy Hash: 2CF06237B3054482FB549B21E895BA66369FBD0748F906439ED4B81864DF3CCE0ACB00

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 3876 13ff791e8-13ff79219 GetClassNameW 3877 13ff79248-13ff7924b 3876->3877 3878 13ff7921b-13ff7922e call 13ff713c4 3876->3878 3880 13ff7924d-13ff79255 SHAutoComplete 3877->3880 3881 13ff7925b-13ff79273 call 13ff82320 3877->3881 3878->3877 3884 13ff79230-13ff79245 FindWindowExW 3878->3884 3880->3881 3884->3877
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                  • String ID: EDIT
                                                                                  • API String ID: 4243998846-3080729518
                                                                                  • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                  • Instruction ID: 3fe58c69dc36606d2d4044fe9554d78de7286a7d973d8b90997964ddc7bb9a4f
                                                                                  • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                  • Instruction Fuzzy Hash: 7B013173B10A8581FB349B21E8117D66398AB98784F4411398D4D467A5DE6CC74EC640
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$Handle
                                                                                  • String ID:
                                                                                  • API String ID: 4209713984-0
                                                                                  • Opcode ID: 6cd78db48ad0d9b226c97101cb61b208fe2fcd81b3a9cbf8e3f9182465f50604
                                                                                  • Instruction ID: 8c8278b3f3408f87cc4e4c064866970414f07e4499ff7b68d038cceab4cf5fe6
                                                                                  • Opcode Fuzzy Hash: 6cd78db48ad0d9b226c97101cb61b208fe2fcd81b3a9cbf8e3f9182465f50604
                                                                                  • Instruction Fuzzy Hash: 6051E233B11A4192FF50CB25D9447EA6368F795BA4F440139EE0A07AE4EF7CC68AC300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ItemText
                                                                                  • String ID:
                                                                                  • API String ID: 3750147219-0
                                                                                  • Opcode ID: 37944a8cf501712dba7b7552f49b5fdb5cf8609680ceced34cad6b817c0b05d3
                                                                                  • Instruction ID: 512ea58a5e5c08748cd5ba35b1130083ce5dbcffdf828d7bd2f42351dce3d2e3
                                                                                  • Opcode Fuzzy Hash: 37944a8cf501712dba7b7552f49b5fdb5cf8609680ceced34cad6b817c0b05d3
                                                                                  • Instruction Fuzzy Hash: C7517E73F20B6085FF009BA5D8453DD276ABB45BA4F90062ADE1C1BBEADF64C642C314
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2359106489-0
                                                                                  • Opcode ID: ac7929ab680600a75a05425a8dcfbf923b8573e4052e4e1cf8798639435a1a0e
                                                                                  • Instruction ID: bd523d018f19feee12e41608a5206b3e18ec0c06c6b85a3d2ae3456a7cfb135b
                                                                                  • Opcode Fuzzy Hash: ac7929ab680600a75a05425a8dcfbf923b8573e4052e4e1cf8798639435a1a0e
                                                                                  • Instruction Fuzzy Hash: A331D273A08A8181FB209B35A5853EE6369F7897B0F500239EE99437D5DF38C6478600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                  • String ID:
                                                                                  • API String ID: 1452418845-0
                                                                                  • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                  • Instruction ID: 38a66132f8a18a21de88722b591adbd19318f47f3bfe959ca655296bd52075e0
                                                                                  • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                  • Instruction Fuzzy Hash: D2316E33E0126042FB64BB64D9553EA2F99AB41784F44043CEE4A4B3E7DE28EB0BC355
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FileHandleRead
                                                                                  • String ID:
                                                                                  • API String ID: 2244327787-0
                                                                                  • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                  • Instruction ID: e886909bc6bcf5adffdd55d9ae8a09cf290f7fea08ed8fbcdbbff82bc0a072e0
                                                                                  • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                  • Instruction Fuzzy Hash: 0321CD33E04A4081EE609F31E4013AE63A8F345BA8F144578DE995B7D8DF7DCA878B11
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF6ECD8: ResetEvent.KERNEL32 ref: 000000013FF6ECF1
                                                                                    • Part of subcall function 000000013FF6ECD8: ReleaseSemaphore.KERNEL32 ref: 000000013FF6ED07
                                                                                  • ReleaseSemaphore.KERNEL32 ref: 000000013FF6E974
                                                                                  • CloseHandle.KERNELBASE ref: 000000013FF6E993
                                                                                  • DeleteCriticalSection.KERNEL32 ref: 000000013FF6E9AA
                                                                                  • CloseHandle.KERNEL32 ref: 000000013FF6E9B7
                                                                                    • Part of subcall function 000000013FF6EA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,000000013FF6E95F,?,?,?,000000013FF6463A,?,?,?), ref: 000000013FF6EA63
                                                                                    • Part of subcall function 000000013FF6EA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,000000013FF6E95F,?,?,?,000000013FF6463A,?,?,?), ref: 000000013FF6EA6E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 502429940-0
                                                                                  • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                  • Instruction ID: 0a48bb0d91462b78da85bf2cc6407aaff27f885b4ba4cca0939e921f7c1811be
                                                                                  • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                  • Instruction Fuzzy Hash: 78010C33A10A90A2E648DB21EA4479EB335F788BD0F404125DF6A03665CF35D6B6C744
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CreatePriority
                                                                                  • String ID: CreateThread failed
                                                                                  • API String ID: 2610526550-3849766595
                                                                                  • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                  • Instruction ID: 1e74c08b129393a4e088963cc4eff2c6a22dc8c623d7ea611f53ff371c5e0c83
                                                                                  • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                  • Instruction Fuzzy Hash: 22110D33A14A4092FB15DF21E8813DA7368F784B98F5445399E4906769EF38CA97CB44
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: DirectoryInitializeMallocSystem
                                                                                  • String ID: riched20.dll
                                                                                  • API String ID: 174490985-3360196438
                                                                                  • Opcode ID: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                                                                                  • Instruction ID: 676c9cc8ef4d454d8caf9ca2f562ff0e648da6e63a3edca889df8b61ba4f5627
                                                                                  • Opcode Fuzzy Hash: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                                                                                  • Instruction Fuzzy Hash: 2EF04F72614A4482EB409F20F41539EB7A4FB88754F440139ED8E42754DF7CCA4ECB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2584219951-0
                                                                                  • Opcode ID: 2257e0b6f8e0a972416a043cca1dd440209c131bba8554c2344489417849a289
                                                                                  • Instruction ID: 05b43c78a487d4ef9eeea401a4a78953d9144bd8375cbf665adac28153c96b08
                                                                                  • Opcode Fuzzy Hash: 2257e0b6f8e0a972416a043cca1dd440209c131bba8554c2344489417849a289
                                                                                  • Instruction Fuzzy Hash: FEA1C573B10B558AEB648F65D4403E96BD9FB88BA8F044239EE5947BC9DB7CC6468300
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF7853C: GlobalMemoryStatusEx.KERNEL32 ref: 000000013FF7856C
                                                                                    • Part of subcall function 000000013FF6AAE0: LoadStringW.USER32 ref: 000000013FF6AB67
                                                                                    • Part of subcall function 000000013FF6AAE0: LoadStringW.USER32 ref: 000000013FF6AB80
                                                                                    • Part of subcall function 000000013FF51FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF51FFB
                                                                                    • Part of subcall function 000000013FF5129C: Concurrency::cancel_current_task.LIBCPMT ref: 000000013FF51396
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF801BB
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF801C1
                                                                                  • SendDlgItemMessageW.USER32 ref: 000000013FF801F2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                                                  • String ID:
                                                                                  • API String ID: 3106221260-0
                                                                                  • Opcode ID: b44ab40ada4fdf7cdbcaa15f8daeace4536de695359eeab31afda72367bc6ece
                                                                                  • Instruction ID: 0b793923b58cd5e9a37c0590b2a3aecf96590713e83a098dae3d287294cabff5
                                                                                  • Opcode Fuzzy Hash: b44ab40ada4fdf7cdbcaa15f8daeace4536de695359eeab31afda72367bc6ece
                                                                                  • Instruction Fuzzy Hash: 7C51C273F11B5086FB10ABB5D4553ED236AA789BD8F40023ADE1D577DAEE28C642C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2272807158-0
                                                                                  • Opcode ID: 4deb08ca3be5073a72b2bd7db4a08fd3c34f80865c8b8240031b88655e7f576e
                                                                                  • Instruction ID: 249cf942424de98eb5e779117b96985839f5c0cdb6cab4c45cb53e71336278c1
                                                                                  • Opcode Fuzzy Hash: 4deb08ca3be5073a72b2bd7db4a08fd3c34f80865c8b8240031b88655e7f576e
                                                                                  • Instruction Fuzzy Hash: E841AD73A14B8482EF248F25E44439A67A5F385BB8F105729DFA907AD9CF7CC696C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2176759853-0
                                                                                  • Opcode ID: edbdae515b0ac00df6a361e0ea4ef83759fb05d05b990204e34ba692badc1145
                                                                                  • Instruction ID: 3bfd6fcffb4fc2d8d27ee92904e10f3e1452b968b7bf2c30442fb6051b6d457d
                                                                                  • Opcode Fuzzy Hash: edbdae515b0ac00df6a361e0ea4ef83759fb05d05b990204e34ba692badc1145
                                                                                  • Instruction Fuzzy Hash: F121B173A24B8481EA149B65E8403AAB768F789BD0F144329EFDD03B95CF3CD282C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::bad_alloc::bad_alloc
                                                                                  • String ID:
                                                                                  • API String ID: 1875163511-0
                                                                                  • Opcode ID: 65d8091f10f06cce83768fe095ce433e052fa83f4fe25a8c85fad3cbd40ccd0d
                                                                                  • Instruction ID: 484d667416ba45d93848a30a12c2f4522452db6e5055e4d8c455df0c88563fff
                                                                                  • Opcode Fuzzy Hash: 65d8091f10f06cce83768fe095ce433e052fa83f4fe25a8c85fad3cbd40ccd0d
                                                                                  • Instruction Fuzzy Hash: 7031B633A05A8452FB24A714E4443D9A3A8F340BC4F54443DDA8C467A9DFB9DB5FC701
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1203560049-0
                                                                                  • Opcode ID: 6ed0c8a070441816d5330cd3769e28eb6ceea82749a6528c2ac8f8b7ff7a8567
                                                                                  • Instruction ID: d7a9c682e90cda4ab5d5438339c50fa14a5b365b37a77e701b0d3c362459cbe6
                                                                                  • Opcode Fuzzy Hash: 6ed0c8a070441816d5330cd3769e28eb6ceea82749a6528c2ac8f8b7ff7a8567
                                                                                  • Instruction Fuzzy Hash: 80219533A14A8481EE209F65E4553DA6365FB88BA4F505238EE9E477D5EF3CC646CA00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3118131910-0
                                                                                  • Opcode ID: 1fd191feb40cc67e00974fea17ca92e04a2935e1faff0a05b7b511311eb8a7b5
                                                                                  • Instruction ID: 7897bacba34929470b12a1d684dba3961c1ac75c39bcb53222e3eaeaf18023db
                                                                                  • Opcode Fuzzy Hash: 1fd191feb40cc67e00974fea17ca92e04a2935e1faff0a05b7b511311eb8a7b5
                                                                                  • Instruction Fuzzy Hash: 9B219533A1478081EE108B25F84539E6364F789BA8F501239EE9E46BE9DF3CC682C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1203560049-0
                                                                                  • Opcode ID: 9a50065414fe101911552ba5ebcc3347b9eb07001169c906163cef81c3539e2a
                                                                                  • Instruction ID: a430f78b60e312c2b958beee7a98d992e4dd7836cc9fc6b72477ceeaed7624bc
                                                                                  • Opcode Fuzzy Hash: 9a50065414fe101911552ba5ebcc3347b9eb07001169c906163cef81c3539e2a
                                                                                  • Instruction Fuzzy Hash: 20215033A14B8082EA109B29F44539A6375F7C9BA4F500229EE9D47BE9DF3CC682C704
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 1703294689-0
                                                                                  • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                  • Instruction ID: 9a6bc1632186e8c5ba1d6c74397b35afb8722ab2f5f1849ae1fd5b8c7a3667cc
                                                                                  • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                                                                                  • Instruction Fuzzy Hash: 06E0463AB0031487EB646B719D993EA275AAB88B41F10543CCD16033ABCE398A4BC700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Info
                                                                                  • String ID:
                                                                                  • API String ID: 1807457897-3916222277
                                                                                  • Opcode ID: a8c800685481078d801c3a9547140eba41de8252033d851bc208b7bc76324660
                                                                                  • Instruction ID: 1ea8a9d9586e0b555edd846d309642b4abc12730e44c414d0d4e1f77b2ceaae3
                                                                                  • Opcode Fuzzy Hash: a8c800685481078d801c3a9547140eba41de8252033d851bc208b7bc76324660
                                                                                  • Instruction Fuzzy Hash: 30518373A186C08BE721CF38E0843DE7BA8F348748F54412ADB8987A95CB79C257CB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: String
                                                                                  • String ID: LCMapStringEx
                                                                                  • API String ID: 2568140703-3893581201
                                                                                  • Opcode ID: 17426379dc5621f9e1018306a2e07a6620b14fb09a176a6cc70ab50f48641bf8
                                                                                  • Instruction ID: c022e30be7b9fe8e75c93bb26716e6c87f22a63554dd801fde6ab9a33cb287cc
                                                                                  • Opcode Fuzzy Hash: 17426379dc5621f9e1018306a2e07a6620b14fb09a176a6cc70ab50f48641bf8
                                                                                  • Instruction Fuzzy Hash: 3C213036A04B8486DB64CB56F84039AB7A5F7C9B90F54412ADECD43B59DF38C546CB04
                                                                                  APIs
                                                                                  • InitializeCriticalSectionAndSpinCount.KERNELBASE(?,?,00000003,000000013FF8D771), ref: 000000013FF8F781
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountCriticalInitializeSectionSpin
                                                                                  • String ID: InitializeCriticalSectionEx
                                                                                  • API String ID: 2593887523-3084827643
                                                                                  • Opcode ID: c2713cc8f82347ddf34c1ff1e3a46d417220554c4cdd39c6d4a1de9404e2d7ea
                                                                                  • Instruction ID: 5def71678e8c8835e632703793175d5c63a0445a0bdd9e2b8b7e73e43f3cba4d
                                                                                  • Opcode Fuzzy Hash: c2713cc8f82347ddf34c1ff1e3a46d417220554c4cdd39c6d4a1de9404e2d7ea
                                                                                  • Instruction Fuzzy Hash: E3F04F3AB15B9482EB049B46F5803DE7765AB89BD0F984039EE8907B59CE78CA46C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Alloc
                                                                                  • String ID: FlsAlloc
                                                                                  • API String ID: 2773662609-671089009
                                                                                  • Opcode ID: 69bde66f6f93e2be0612d4f6e2d410048c1b703c33c775dbe88a9e5d38be4015
                                                                                  • Instruction ID: bf2bc960964b7b7b50b9879a75ff4272e994b323aba33f51f51e617f2401e5df
                                                                                  • Opcode Fuzzy Hash: 69bde66f6f93e2be0612d4f6e2d410048c1b703c33c775dbe88a9e5d38be4015
                                                                                  • Instruction Fuzzy Hash: 40E09232E0564491EE059B55FA543ED23A8EF88BD0FA4103EDD4907391EE38C787C710
                                                                                  APIs
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF5F895
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF5F89B
                                                                                    • Part of subcall function 000000013FF63EC8: FindClose.KERNELBASE(?,?,00000000,000000013FF70811), ref: 000000013FF63EFD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                                  • String ID:
                                                                                  • API String ID: 3587649625-0
                                                                                  • Opcode ID: 4e6642f218c424b74ba5f7528acf490deaa38b33319aba77548da38eac26a4e9
                                                                                  • Instruction ID: 71db8f97f5a82162dfb47373595bf51cc2399f7c289c8f83a9989b322e2573e4
                                                                                  • Opcode Fuzzy Hash: 4e6642f218c424b74ba5f7528acf490deaa38b33319aba77548da38eac26a4e9
                                                                                  • Instruction Fuzzy Hash: EE917E73A14B90D5EB10DF64E8883DD67A9F784798F904129EE5C07AE9DF74C686C340
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF9027C: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000000013FF90599,?,?,?,?,?,?,?,000000013FF90749), ref: 000000013FF902A6
                                                                                  • IsValidCodePage.KERNEL32(?,?,?,00000000,?,00000000,00000001,000000013FF9064C,?,?,?,?,?,?,?,000000013FF90749), ref: 000000013FF90892
                                                                                  • GetCPInfo.KERNEL32(?,?,?,00000000,?,00000000,00000001,000000013FF9064C,?,?,?,?,?,?,?,000000013FF90749), ref: 000000013FF908A7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CodeInfoPageValid
                                                                                  • String ID:
                                                                                  • API String ID: 546120528-0
                                                                                  • Opcode ID: be6a5759142bd0290644e03c106ed6a52b2c001b1214ea6308d5d9eba8f96ecf
                                                                                  • Instruction ID: b26553ff2437d0c8c86482bed3a1e9999c72855fbde49e7f0d77d0b94b0c90d2
                                                                                  • Opcode Fuzzy Hash: be6a5759142bd0290644e03c106ed6a52b2c001b1214ea6308d5d9eba8f96ecf
                                                                                  • Instruction Fuzzy Hash: 1781AF73E1469086F7658F35D4403EE7BA9E344B80F58413AEE89877A5DA79CB83C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: ac102126b0f220e1916f8f5b565c1fb15815e34047790f49f88a60c97a0c8aaa
                                                                                  • Instruction ID: a001a878c6c010a125a3781b5c1b2c1e9379476ad779509d2c3ef6341b267cf9
                                                                                  • Opcode Fuzzy Hash: ac102126b0f220e1916f8f5b565c1fb15815e34047790f49f88a60c97a0c8aaa
                                                                                  • Instruction Fuzzy Hash: 23418C73F106A085FF00DBB9D4597DD276AAB45BD8F145239EE1D27ADADA34C6838300
                                                                                  APIs
                                                                                  • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,000000013FF6274D), ref: 000000013FF628A9
                                                                                  • GetLastError.KERNEL32(?,000000013FF6274D), ref: 000000013FF628B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastPointer
                                                                                  • String ID:
                                                                                  • API String ID: 2976181284-0
                                                                                  • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                  • Instruction ID: b0ae025b17793733d988239ffa0ff6daac6c698f6a31d026fc4bc89f60c4e8d7
                                                                                  • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                  • Instruction Fuzzy Hash: 1D319133B12A5082EE604B3ADD807D92398AB44BE4F54013ADE19577E4DF3CCA839744
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1746051919-0
                                                                                  • Opcode ID: 50d3dabbc2cad761c4bf160d2ea854522c0340c6e18f5e49c1c90068bd6a6ba9
                                                                                  • Instruction ID: 7137c13b380ebe6d6e877eed848ca0b7b340879a800e6da6f7b013b4c3dc148a
                                                                                  • Opcode Fuzzy Hash: 50d3dabbc2cad761c4bf160d2ea854522c0340c6e18f5e49c1c90068bd6a6ba9
                                                                                  • Instruction Fuzzy Hash: 0C31B033A1078482EA109F19E4493DEB368EB84B90F444229EF9D17B95DF7CE686C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFlushTime
                                                                                  • String ID:
                                                                                  • API String ID: 1392018926-0
                                                                                  • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                  • Instruction ID: 16ea547e45fdb337dd92ed090aa166b0bcd85ecb558cb33e21e2ec595b176583
                                                                                  • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                  • Instruction Fuzzy Hash: BD21D033F06B4191EE628F31E5157EA6798E7097A8F5580399E48073B5EE3CC687C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString
                                                                                  • String ID:
                                                                                  • API String ID: 2948472770-0
                                                                                  • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                  • Instruction ID: 2a6765068ef61ea87b99ca83ec463d883277c871bc9cabbcb5eed4b26ce53ee9
                                                                                  • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                  • Instruction Fuzzy Hash: 52116A72B04B4486EA048F2AA940789B7A9B789FD0F54453DCE09A3731DF78CE428744
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastPointer
                                                                                  • String ID:
                                                                                  • API String ID: 2976181284-0
                                                                                  • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                  • Instruction ID: c1bd6e8445d59117209e9db98ced65471aaed51c5cb3ad403f4f0d190566de09
                                                                                  • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                  • Instruction Fuzzy Hash: 7F113733A1468082EB608B25E8857996368E745BB8F54432ADE6D562E9DF38CA97C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemRectTextWindow$Clientswprintf
                                                                                  • String ID:
                                                                                  • API String ID: 3322643685-0
                                                                                  • Opcode ID: 64054e75db15c4c181a3b608a21e6fd390ef54e23b9c378e0d592242a50efdfc
                                                                                  • Instruction ID: 1303b73f3f01fdf7aac96d1ffcf20e6b5ae8ea8523a696201ba6edd35a54bb0b
                                                                                  • Opcode Fuzzy Hash: 64054e75db15c4c181a3b608a21e6fd390ef54e23b9c378e0d592242a50efdfc
                                                                                  • Instruction Fuzzy Hash: 0301EC32E0564981FF595F52A4683E95799AB85B84F08413DED49067EAEE6CCF86C300
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(?,?,?,?,000000013FF6EBAD,?,?,?,?,000000013FF65752,?,?,?,000000013FF656DE), ref: 000000013FF6EB5C
                                                                                  • GetProcessAffinityMask.KERNEL32 ref: 000000013FF6EB6F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$AffinityCurrentMask
                                                                                  • String ID:
                                                                                  • API String ID: 1231390398-0
                                                                                  • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                  • Instruction ID: 357eb970ceb00d740ecc40a82e04265c33b9cd03504022598702de2339af74b4
                                                                                  • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                  • Instruction Fuzzy Hash: C0E09B73F2058546DF598F65D4517DA7396BBC8B44F848039DA0783624DE2DD646CB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                  • String ID:
                                                                                  • API String ID: 1173176844-0
                                                                                  • Opcode ID: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                                                  • Instruction ID: 9eb3fbe7a34335b4a50b3b94feb11b0b10dcf52c0e0fa214a5b4bb5097459b99
                                                                                  • Opcode Fuzzy Hash: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                                                  • Instruction Fuzzy Hash: 39E01773F0252945FE287272982A3F40C8C4F29370E2C1B3CDE36482D2AE24E7939210
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Alloc__vcrt___vcrt_uninitialize_ptd
                                                                                  • String ID:
                                                                                  • API String ID: 3765095794-0
                                                                                  • Opcode ID: b626eb9a3b6ada7a78012530218f632c6a75038fb9b1341251fc2fb1ecdc57fa
                                                                                  • Instruction ID: f4e885255cf988fb43ac90740adf97b030488b34e72f62ac27105ff87e8c9cc8
                                                                                  • Opcode Fuzzy Hash: b626eb9a3b6ada7a78012530218f632c6a75038fb9b1341251fc2fb1ecdc57fa
                                                                                  • Instruction Fuzzy Hash: 7BE04F77D10A20D2FA106B349C853F82E5A6B41330FD4163CDC29862E2DBB4CB47D750
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 485612231-0
                                                                                  • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                  • Instruction ID: 6e017697516e95d06e9f42e9ced937efb18a68749daa5ac596941cdc938463ed
                                                                                  • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                  • Instruction Fuzzy Hash: D3E0EC73E0155546FF18AFB298453ED16D95F94B55F44403CCD0986392EA288A87C600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: deae3c916c444cfeab86934886f13cb992ac779b5b91c30a9f2379e968adca9b
                                                                                  • Instruction ID: 634be8ff8dd2e16365be58a56f93a93640c67fd58b9baedc9bc9c2af34b5d8f5
                                                                                  • Opcode Fuzzy Hash: deae3c916c444cfeab86934886f13cb992ac779b5b91c30a9f2379e968adca9b
                                                                                  • Instruction Fuzzy Hash: 74D18B73B04680D6FB688B2996883E9ABAAF705F94F04043ECF5D477A5CB34D666C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1017591355-0
                                                                                  • Opcode ID: f77260627b75add95ca9d2c0935e9610f9349842e6d8a2c52f671b725446453a
                                                                                  • Instruction ID: c19ee01f88703691be4b4dce601ae6c6ff5ce1aa37ab2020588891449f4c6869
                                                                                  • Opcode Fuzzy Hash: f77260627b75add95ca9d2c0935e9610f9349842e6d8a2c52f671b725446453a
                                                                                  • Instruction Fuzzy Hash: 47614733E1464581FE649A3584653FE669EAB41FF4F1C423DAE4977AC6EE78C6438300
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF6E948: ReleaseSemaphore.KERNEL32 ref: 000000013FF6E974
                                                                                    • Part of subcall function 000000013FF6E948: CloseHandle.KERNELBASE ref: 000000013FF6E993
                                                                                    • Part of subcall function 000000013FF6E948: DeleteCriticalSection.KERNEL32 ref: 000000013FF6E9AA
                                                                                    • Part of subcall function 000000013FF6E948: CloseHandle.KERNEL32 ref: 000000013FF6E9B7
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF71ACB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 904680172-0
                                                                                  • Opcode ID: 64e4c0b27db856b2e1557b0c40e73339b2e4437797481325bfee9d1e55471a1b
                                                                                  • Instruction ID: c1dcc8ca51fa04f1f21504ec668155b4baab049fa8e27822acdff02aa643b5c5
                                                                                  • Opcode Fuzzy Hash: 64e4c0b27db856b2e1557b0c40e73339b2e4437797481325bfee9d1e55471a1b
                                                                                  • Instruction Fuzzy Hash: F0616C73B11A84A2FE08EF65D5543ECB369FB40BD4F54423AEF2947A85CF64D66A8300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: ee4693f2c48cedbc51ad7bc029ee064e32ea8ec3cb116d2b04c7847efbfa9451
                                                                                  • Instruction ID: 0af7f90209df9aee8286023f889af59ac7ea316f64285743e6e63e7859ee349d
                                                                                  • Opcode Fuzzy Hash: ee4693f2c48cedbc51ad7bc029ee064e32ea8ec3cb116d2b04c7847efbfa9451
                                                                                  • Instruction Fuzzy Hash: 4B51BE73A10A8081FA149B26E4493DD2B99F786BD8F44013AEE4D07796DF7DC686C304
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF63EC8: FindClose.KERNELBASE(?,?,00000000,000000013FF70811), ref: 000000013FF63EFD
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF5E993
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1011579015-0
                                                                                  • Opcode ID: e8163c2a7431a384f10e23062ae674c5baa781d2f4b04224e71daf838b7b6f9c
                                                                                  • Instruction ID: ee86bea57d88025741b58404f93691a95857aad7e7190dcfd366113d89ad7a60
                                                                                  • Opcode Fuzzy Hash: e8163c2a7431a384f10e23062ae674c5baa781d2f4b04224e71daf838b7b6f9c
                                                                                  • Instruction Fuzzy Hash: ED513D33A14684C2FB609F65D4893DD63A9F785B98F44013AEE8D4B7A5DF28CA43C718
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 1d654c8d03723e7a52e8c6ec94e86296d18edc9530b95e6b5aacb605859593f9
                                                                                  • Instruction ID: 76f6358208ddeff49a7c98250361a45c83bde122b2466c157141ab22deade09e
                                                                                  • Opcode Fuzzy Hash: 1d654c8d03723e7a52e8c6ec94e86296d18edc9530b95e6b5aacb605859593f9
                                                                                  • Instruction Fuzzy Hash: 5441C673B14A9042EF149A27EA443A9A659F784FD0F448539EE8C47F5ADF78C6928340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: cab7c8e5bf3294768a5d9aacc8301bc09f4a461291b50e69aa2630182cdd03d2
                                                                                  • Instruction ID: 9eb5f79aaf7b147d53e544e3cc65aaaa89721b632a87c733909a537b6ab43459
                                                                                  • Opcode Fuzzy Hash: cab7c8e5bf3294768a5d9aacc8301bc09f4a461291b50e69aa2630182cdd03d2
                                                                                  • Instruction Fuzzy Hash: 0541DD73A00B5481FE149B39E5453AA23A5E789BE8F141239EE49077AADF39C6868740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule$AddressFreeLibraryProc
                                                                                  • String ID:
                                                                                  • API String ID: 3947729631-0
                                                                                  • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                  • Instruction ID: 54b607a89ff5251efc099be7139e753f2e4759d41f7c4633adb594795c344f78
                                                                                  • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                                                                                  • Instruction Fuzzy Hash: 0941F133E1062086FB24DB14D9903E92BA9A799B40F44443EDF2A5B7E1EB39CE47C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                                  • String ID:
                                                                                  • API String ID: 680105476-0
                                                                                  • Opcode ID: c531f2d93e59bc2c3255c3b03e21e7a52a1bb814650bbdd6308fec67296c0182
                                                                                  • Instruction ID: 89b77ab24fd4522c1744a4b825f4586d63fa82ba542b641a70d73c41cbdcf897
                                                                                  • Opcode Fuzzy Hash: c531f2d93e59bc2c3255c3b03e21e7a52a1bb814650bbdd6308fec67296c0182
                                                                                  • Instruction Fuzzy Hash: 7C21B333A00750C5EA14AF92E4183E96658F705FF0F680B389F7D57BD1DAB8E6928344
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 8fc652ac7c959a295c7730ce90c0f7499c45745d6b82b8dbd8efa7802d42d794
                                                                                  • Instruction ID: f645a3a67293f48c0528c26034f4d1fd0e24852e9edac33720fe3aafe75800b7
                                                                                  • Opcode Fuzzy Hash: 8fc652ac7c959a295c7730ce90c0f7499c45745d6b82b8dbd8efa7802d42d794
                                                                                  • Instruction Fuzzy Hash: E50180B3E14AC491FE119B28E4453997366F789B94F805229EEDC07BA6EF68D2428704
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF81604: GetModuleHandleW.KERNEL32(?,?,?,000000013FF81573,?,?,?,000000013FF8192A), ref: 000000013FF8162B
                                                                                  • DloadProtectSection.DELAYIMP ref: 000000013FF815C9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: DloadHandleModuleProtectSection
                                                                                  • String ID:
                                                                                  • API String ID: 2883838935-0
                                                                                  • Opcode ID: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                  • Instruction ID: 8014e46e4ef55960ebe763c8610d1e8dec3c945d6d2fe98a5e07142ddb4d5811
                                                                                  • Opcode Fuzzy Hash: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                  • Instruction Fuzzy Hash: 74111273E1461881FB64AB05EA853D0279CA794F58F18013CCD0A4B3B5EB388F97C710
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF640BC: FindFirstFileW.KERNELBASE ref: 000000013FF6410B
                                                                                    • Part of subcall function 000000013FF640BC: FindFirstFileW.KERNEL32 ref: 000000013FF6415E
                                                                                    • Part of subcall function 000000013FF640BC: GetLastError.KERNEL32 ref: 000000013FF641AF
                                                                                  • FindClose.KERNELBASE(?,?,00000000,000000013FF70811), ref: 000000013FF63EFD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$FileFirst$CloseErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1464966427-0
                                                                                  • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                  • Instruction ID: b19a895a067a45cf775019a167a8288e864ed64219d65ef86b50a77a84d9a22e
                                                                                  • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                  • Instruction Fuzzy Hash: E9F0C27390428085EA54AFB5A2013D93764971ABB4F14133CAE3A073C7CE24C586C745
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                  • Instruction ID: 9ad1d5697055dadf452563244f0d454fb5de12ed46d329a733884f66dc0def7e
                                                                                  • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                  • Instruction Fuzzy Hash: B1F0A033F012A454FF646FB158553ED1E985F847A4F08163CDD2A863C1DE28CA838210
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: File
                                                                                  • String ID:
                                                                                  • API String ID: 749574446-0
                                                                                  • Opcode ID: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                  • Instruction ID: 054d705549f475647b938e6fb612d5f826bd0f27f847298e79924704865d25e3
                                                                                  • Opcode Fuzzy Hash: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                                                                                  • Instruction Fuzzy Hash: CCE0C223B2051482EF20AB3AC842B991324EB8DFC4F8810348E0C07371CE29C596CA00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: __vcrt_uninitialize_ptd
                                                                                  • String ID:
                                                                                  • API String ID: 1180542099-0
                                                                                  • Opcode ID: ce8e2ffe289f7fce94720d68f3ba514a3dbdfcf06443afd0443132baf869d67a
                                                                                  • Instruction ID: 3fe39ffbc9e36f73510a1bd9768d8e471a5aa97c453af4b3efc6676f47f53713
                                                                                  • Opcode Fuzzy Hash: ce8e2ffe289f7fce94720d68f3ba514a3dbdfcf06443afd0443132baf869d67a
                                                                                  • Instruction Fuzzy Hash: 1AE01273D1213094FE646B3054867EC1A5C2F1571CF90093EDD164A3D2E72487475A10
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileType
                                                                                  • String ID:
                                                                                  • API String ID: 3081899298-0
                                                                                  • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                  • Instruction ID: 88852df6a09b9446f4f6074f265d219cc3eded0c419d742a454713727063a99c
                                                                                  • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                  • Instruction Fuzzy Hash: 5FD01233D0144082DD1097369C923AD2354AB92735FB40714DA3A816E2CE1DC697A311
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory
                                                                                  • String ID:
                                                                                  • API String ID: 1611563598-0
                                                                                  • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                  • Instruction ID: 25d916a43c7c912c3afd3c7dfb4b99822d623809f6e04952b0f15cf153495b97
                                                                                  • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                  • Instruction Fuzzy Hash: D5C04C32F15501C1DA089B26C9CA74913A9B754B15FA54129D90981270DE29C6EB9785
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                  • Instruction ID: 1fba9aaf451822fc74a427bacb20e072528fed0eafb1675719ee2125144ca135
                                                                                  • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                  • Instruction Fuzzy Hash: 58F0CD33A0968585FF248F30E1413A92768E314BB8F484329EF38852D8DF28CA97C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                                                  • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                  • API String ID: 2659423929-3508440684
                                                                                  • Opcode ID: 2b29d3339ab04c1a7270bf370d50b6fd8c35a30e2b651de71bed7b22e0c2bcde
                                                                                  • Instruction ID: 460eadae20b32894396cd7880fdc96c56a479f45b04a6952e67c16b9cc067d88
                                                                                  • Opcode Fuzzy Hash: 2b29d3339ab04c1a7270bf370d50b6fd8c35a30e2b651de71bed7b22e0c2bcde
                                                                                  • Instruction Fuzzy Hash: 34629E73F10A9085FB00DBB4D4893DD2769E7857A8F50422ADE6D57AEADF74C68AC300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                                                  • String ID: %ls$%s: %s
                                                                                  • API String ID: 2539828978-2259941744
                                                                                  • Opcode ID: ad02539a7615a4da39f249392d2b6a9ba509cbab837690a24a6727856c9cddba
                                                                                  • Instruction ID: f40804b097a89f2d26a256cedc37e0e051028affa947d1162a1f6f37bf1664cd
                                                                                  • Opcode Fuzzy Hash: ad02539a7615a4da39f249392d2b6a9ba509cbab837690a24a6727856c9cddba
                                                                                  • Instruction Fuzzy Hash: 40B27773A1468182EA109F25D4553EEA319FBD67D0F10433AAE9D47BEAEF68C746C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfomemcpy_s
                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                  • API String ID: 1759834784-2761157908
                                                                                  • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                  • Instruction ID: a4a39caccf6f3b86f5ee1c1f221a174397509cff130440ca14e2b5b916a94c7c
                                                                                  • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                  • Instruction Fuzzy Hash: 41B2C173E002918BE7758E69D840BEE3BA9F38878CF50513DDE1657B98DB35CA068B40
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                                                  • String ID: rtmp
                                                                                  • API String ID: 3587137053-870060881
                                                                                  • Opcode ID: 46720b277ee4ca4cb7735330bedb27dc610672b28b4e4f5b2232f8dc8f14668d
                                                                                  • Instruction ID: 57a3ae537b60dd336bef8a7d4d22f3657a11b6a5ee5aacb5c33b054af5325204
                                                                                  • Opcode Fuzzy Hash: 46720b277ee4ca4cb7735330bedb27dc610672b28b4e4f5b2232f8dc8f14668d
                                                                                  • Instruction Fuzzy Hash: DEF1D233B00A8081EB10EB75D4843DE67B5F7857E4F50122AEE8D43AA9DF38C686C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1693479884-0
                                                                                  • Opcode ID: 9da81c3bc7566f90a4d86f7365aa6446543d628d65e0ea004da70b429abed106
                                                                                  • Instruction ID: 7e260c1ddeac3f64ee9584eee10263484d72200e21243c47adc06537800aebc4
                                                                                  • Opcode Fuzzy Hash: 9da81c3bc7566f90a4d86f7365aa6446543d628d65e0ea004da70b429abed106
                                                                                  • Instruction Fuzzy Hash: 02A19273F11B6085FF108BB9D9443ED2365A795BE4F585229DE2A27BD9DE74C283C200
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3140674995-0
                                                                                  • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                  • Instruction ID: 08c02068cc454cddd9b235bfedfb05704c60a87fd6fbfbf3ccc31694349f6a07
                                                                                  • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                  • Instruction Fuzzy Hash: E8315973604B909AEB608F60E8507EE7768F784B48F84443EDE4E57A98EF78C649C710
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1239891234-0
                                                                                  • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                  • Instruction ID: 6c636af7861857ca3327a5032b2928d11d54361aa56d83d8debfa23152fc7edc
                                                                                  • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                  • Instruction Fuzzy Hash: 0B315E33614B9096EB60CF25E8407DE77A8F788B54F540129EE9D43B99EF38C656CB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3668304517-0
                                                                                  • Opcode ID: 300dd9cc50a5c7816435619c3f5343720d80d9ae4efb6ade2117f3cf4a891e63
                                                                                  • Instruction ID: 88d5157198a7235f124ab7793e65aae37390ac8e8f6d28820c76ba166f7971f5
                                                                                  • Opcode Fuzzy Hash: 300dd9cc50a5c7816435619c3f5343720d80d9ae4efb6ade2117f3cf4a891e63
                                                                                  • Instruction Fuzzy Hash: E3B1BF73B10A9496EB10AF65D8483DE2365F7897D8F505229EE5D07BA9EF38D642C300
                                                                                  APIs
                                                                                  • _invalid_parameter_noinfo.LIBCMT ref: 000000013FF8FAC4
                                                                                    • Part of subcall function 000000013FF87934: GetCurrentProcess.KERNEL32(000000013FF90CCD), ref: 000000013FF87961
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                                  • String ID: *?$.
                                                                                  • API String ID: 2518042432-3972193922
                                                                                  • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                  • Instruction ID: a1cea1e974561325173d300ebecf886d0c4ad7b8942a1e15027de752315acff3
                                                                                  • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                  • Instruction Fuzzy Hash: FD51B473B11AA449EF10DFA2E8107ED6BA8FB48BD8F544539DE5917B85DA38C6438300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy_s
                                                                                  • String ID:
                                                                                  • API String ID: 1502251526-0
                                                                                  • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                  • Instruction ID: 95c822bb3e478e7243c4fe255bc125d522f977669741ac83309d47674cd2fe25
                                                                                  • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                  • Instruction Fuzzy Hash: 87D1C133B1568587EBB4CF15E188BAAB7A9F398784F148138DF4A57B44D738DA46CB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatFreeLastLocalMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1365068426-0
                                                                                  • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                  • Instruction ID: d65642989c5b842be871ebfb78d0bc0bee207db6dc1bff221ddbac3f5d46bcb8
                                                                                  • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                  • Instruction Fuzzy Hash: 7401FF72608B4182E7109F22B9553AB6799F789BC0F484038AE8E47B99CE38C616CB00
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: .
                                                                                  • API String ID: 0-248832578
                                                                                  • Opcode ID: c6a507b225cd4218212adc004c755bbf20f968de81e7d05236a270c9e1509e97
                                                                                  • Instruction ID: 867fee5739ecdc7ec1c9c0fecc51557a32a41816199411bfcc29623122cab136
                                                                                  • Opcode Fuzzy Hash: c6a507b225cd4218212adc004c755bbf20f968de81e7d05236a270c9e1509e97
                                                                                  • Instruction Fuzzy Hash: 6831FB33B106A049FB209B36E8057DA7E95B795FE4F148239DF5847BC5DA38C6038300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise_clrfp
                                                                                  • String ID:
                                                                                  • API String ID: 15204871-0
                                                                                  • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                  • Instruction ID: d403ae90d734a446e9862ba7a556967cc289086959e7b30ccd99a639cc36965d
                                                                                  • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                  • Instruction Fuzzy Hash: 65B12D77610B888BEB19CF29C8463AD7BE4F384B58F198926DF59877A4CB39C552C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectRelease$CapsDevice
                                                                                  • String ID:
                                                                                  • API String ID: 1061551593-0
                                                                                  • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                  • Instruction ID: 81945823ece2f6e6b3cf0f5967938ed4441689b07eef84a027a4d609f1825289
                                                                                  • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                  • Instruction Fuzzy Hash: 2E81F637B14A0486EB208F6AE94079D7779F788F98F50412ADE0D97B68DF39C64AC740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatInfoLocaleNumber
                                                                                  • String ID:
                                                                                  • API String ID: 2169056816-0
                                                                                  • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                  • Instruction ID: d7f7d8607c4c0a6006e4383b83c9a7e9ab924c3e022162ed3f53dc294ecb7a83
                                                                                  • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                  • Instruction Fuzzy Hash: E5111933A14B8496E7618F21E8507DA7368FB88B84F844139EF4953768EF38C64ACB44
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF624C0: CreateFileW.KERNELBASE ref: 000000013FF6259B
                                                                                    • Part of subcall function 000000013FF624C0: GetLastError.KERNEL32 ref: 000000013FF625AE
                                                                                    • Part of subcall function 000000013FF624C0: CreateFileW.KERNEL32 ref: 000000013FF6260E
                                                                                    • Part of subcall function 000000013FF624C0: GetLastError.KERNEL32 ref: 000000013FF62617
                                                                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000013FF615D0
                                                                                    • Part of subcall function 000000013FF63980: MoveFileW.KERNEL32 ref: 000000013FF639BD
                                                                                    • Part of subcall function 000000013FF63980: MoveFileW.KERNEL32 ref: 000000013FF63A34
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 34527147-0
                                                                                  • Opcode ID: f8f20fe289e50002a0a54c88778f70f50b297ae81d229b3573a39973a23deb87
                                                                                  • Instruction ID: 9227ead262ab2334fd2b32303ef811a1bb461523f43da6a5031780448c13ed6d
                                                                                  • Opcode Fuzzy Hash: f8f20fe289e50002a0a54c88778f70f50b297ae81d229b3573a39973a23deb87
                                                                                  • Instruction Fuzzy Hash: 3A919D33B20A4482EB50EB76D4853DE6369F795FD8F40402AAE4E57BA5DF38C64AC740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version
                                                                                  • String ID:
                                                                                  • API String ID: 1889659487-0
                                                                                  • Opcode ID: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                  • Instruction ID: 2583f7a22f4c5fb9ec06a59dcf9021b4a6764dac0619645b20ee0ec48716f426
                                                                                  • Opcode Fuzzy Hash: 5e1f820920c456f15e44ae9d5f0cc3b6f822566f542002a6e47536c5256bfc9c
                                                                                  • Instruction Fuzzy Hash: BB01F473D499858AFA31AB30B4257D63798A3A9725F44113CDD98073A1CB3C9B8BCF04
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: 0
                                                                                  • API String ID: 3215553584-4108050209
                                                                                  • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                  • Instruction ID: 3cead3af8d7dfba9b208df4a1e70a6c1f8fb849fc19733a57db6757d48431150
                                                                                  • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                  • Instruction Fuzzy Hash: 09810433B1026146FBB88E2586807ED2BE9E751B48F54193DDD029BB99E735CB4BC740
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: 0
                                                                                  • API String ID: 3215553584-4108050209
                                                                                  • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                  • Instruction ID: 8be7442bd21fdcfe14da5149320ba471e56423d79dbb032cec34a46ca392c2e3
                                                                                  • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                  • Instruction Fuzzy Hash: 76712733A052B056FBB88A2986803EE2FD8A781B44F18597DDD419B7EAC725CB47C741
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: gj
                                                                                  • API String ID: 0-4203073231
                                                                                  • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                  • Instruction ID: f637a4b61fc7bd6cad6b7faad0e2c5ad4ae8af100f868604f958a3c317668b08
                                                                                  • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                  • Instruction Fuzzy Hash: 2451B3377246908BD724CF25E404A9E77A5F388758F45511AEF8A93F09CB39DA45CF40
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: @
                                                                                  • API String ID: 0-2766056989
                                                                                  • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                  • Instruction ID: 2a2f9556701e6a8ab4dbbd60502f2f46b42d51a4c30df0a7b2d657199e74c3af
                                                                                  • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                  • Instruction Fuzzy Hash: C841AC73720A9486EE04CF2AE9543D97BA9A358FD4F49903ADF0D87754EA3CC686C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 54951025-0
                                                                                  • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                  • Instruction ID: 67eca5ec4ff1d79953695c30f467d78128d20735560fbe3c8109e0d06133b3cb
                                                                                  • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                  • Instruction Fuzzy Hash: 30B09231E13A04C2EA082B116D8238822E8BB48740FE8806DC90C91320DA2C0AA68700
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                  • Instruction ID: 2e17112648d7e15954d682b80cf2650cafd958757b7117f531d29f4004e0766f
                                                                                  • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                  • Instruction Fuzzy Hash: BC8217B7A05AC086D715CF28D4447ECBBA5E355FC8F19823EDE9A87395E638C64AC310
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                  • Instruction ID: 8ae18ff76960cb9ecfaa206c9556025bc1c3d85606905e87fae24a52579d077e
                                                                                  • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                  • Instruction Fuzzy Hash: 97626F9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                  • Instruction ID: c77bcddd1ecd00189283bc8f2f89fefb37edb8820b74f8fa021e11f2a54c6577
                                                                                  • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                  • Instruction Fuzzy Hash: 0D82F5B7A056C08AD715CF28D4547FCBB65F355B88F19C23ACE4987789DA38CA4AC710
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                  • Instruction ID: 7b75efdf0a1fe42ce6aa3e05bbf16cfc8d23a438236e0867628e4400cbdb5c59
                                                                                  • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                  • Instruction Fuzzy Hash: AC22C273B206508BD728CF25D89AA5E376AF399744F4B8228DF46CB785DB38D605CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                  • Instruction ID: 78d94c937d19583a91c564099ddf44183383a21ca4fd409826608649f175d15e
                                                                                  • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                  • Instruction Fuzzy Hash: B732BF73A045908BE718CF28D554BFC77A5F354B88F05823EDE8697B88D738996ACB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                  • Instruction ID: 589e1f8573fedb5e1e45907bbfc6df04e31b7e9483db47af7cbc0a57afb0db37
                                                                                  • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                  • Instruction Fuzzy Hash: 1EC189B7B281908FE350CF7AE400A9D3BB1F39878CB51A125EF59A7B09D639D645CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                  • Instruction ID: dd2f1d7c88eec6b89edf88504bbe6270ec99105e22b14caa58487377a92a5099
                                                                                  • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                  • Instruction Fuzzy Hash: 7BA16673F0018086EB25DA38D444BEDB799E3A07C8F55463DDE4697786DA38CA8BCB10
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                  • Instruction ID: 49ac4fea488b8abf7d83622b7361837c2c1ab6046a593be103335b07eb83d4e9
                                                                                  • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                  • Instruction Fuzzy Hash: EFC1C377A291E04DE302CBB5A4249FD3FB5E31E34DF4A4245EF9266B4AD6284301DB60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID:
                                                                                  • API String ID: 190572456-0
                                                                                  • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                  • Instruction ID: 80e53dd981b3e2404f1ef41f83b24969c10655db9f771a9f0ff3cfb6251ae440
                                                                                  • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                  • Instruction Fuzzy Hash: 42913D73B1069096EB11CF29D8517ED2B21FBA6B88F441125EF4E17B5AEE39C70AC300
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                  • Instruction ID: 039ad40ee13289c1bf587f877513873dd904acd69f25b8a2232f4760d8970b12
                                                                                  • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                  • Instruction Fuzzy Hash: F9612033B101D049EB11CF7585007ED7FB9A309798F8A806ACF966374ADA39C606CB20
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                  • Instruction ID: 08380f2dce91d7344b19eeb3a4e77d83a4c1396649638c23a2ea1e3a2c636690
                                                                                  • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                  • Instruction Fuzzy Hash: 6E512673B141A04BF7688F28D018BEDB766F394B88F4541289F4587689DB3DC64ACF00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                  • Instruction ID: 5d171070675999eff4d1b4fbcc7396ad82d07174204f9a6bad209c369a212d21
                                                                                  • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                  • Instruction Fuzzy Hash: 07311AB3A145804BE718DE2AD5517AEB7D5F344394F04813DDF42C7B41DA78D646CB00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                  • Instruction ID: 5f5979c69ea4c99920eeba483fb777014bb344c65626c3eab3d12578f97f8488
                                                                                  • Opcode Fuzzy Hash: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                                                                  • Instruction Fuzzy Hash: 18F01C73F1840D42FB68003C9C193BD105E9B12334F648A7EEE17EA2C6D9E9CA83A149
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                  • Instruction ID: 2b91cc67403da8ffe96a046a0061852d668a65b48d9ce3d5b19577a5702318de
                                                                                  • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                  • Instruction Fuzzy Hash: 38A00273904C50E0E6448B11E9607F12738F350300F94003DF84DA10B4DF389603C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                                                  • API String ID: 3668304517-727060406
                                                                                  • Opcode ID: 7a6d946e213098ab8cc9fb54a64ac08de2763ec1b5bc3a926e1f7339651cfd74
                                                                                  • Instruction ID: 655fa292bdb67be12ae6cd6e0942d283233983c10d559210806300af29d3a344
                                                                                  • Opcode Fuzzy Hash: 7a6d946e213098ab8cc9fb54a64ac08de2763ec1b5bc3a926e1f7339651cfd74
                                                                                  • Instruction Fuzzy Hash: 7441A276A12B00D9EB019F65E5843DD33A9EB48798F80063ADE4C57B69EE34C65AC384
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                  • API String ID: 2565136772-3242537097
                                                                                  • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                  • Instruction ID: 5a9eb0604b345500c8320b7e84a0e297aff23a6530ff72c54371c6d42c35c8dd
                                                                                  • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                  • Instruction Fuzzy Hash: CA211D76E11A1581FF65DB61EA557E927A8AF88B80F84403DCD0A427B1DF38DB87C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                                  • String ID: DXGIDebug.dll$UNC$\\?\
                                                                                  • API String ID: 4097890229-4048004291
                                                                                  • Opcode ID: ee57ffdaa628a4523baa33cf3aee09a7e7a0d12a4d8e146c800fe8bc560304e6
                                                                                  • Instruction ID: 23f7b6d27ec62e20dad744d1774d0ab5ad0ee668fa1fbc051a2bb04700f8547b
                                                                                  • Opcode Fuzzy Hash: ee57ffdaa628a4523baa33cf3aee09a7e7a0d12a4d8e146c800fe8bc560304e6
                                                                                  • Instruction Fuzzy Hash: 17129B33B05A4094EF10DB65E4443DD6379E785BA8F50422AEE5D4BBE9DF38C68AC344
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                                                                  • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                  • API String ID: 431506467-1315819833
                                                                                  • Opcode ID: e649241556eb4477795fcdb655db1f67983da935ee3a1250067e8312a05c5626
                                                                                  • Instruction ID: b3ef5b91e600789c17e6b6812d4d096d5a6e6c34680e6869428fc409cee86bad
                                                                                  • Opcode Fuzzy Hash: e649241556eb4477795fcdb655db1f67983da935ee3a1250067e8312a05c5626
                                                                                  • Instruction Fuzzy Hash: 0AB1CB73F11B8085FB00DFA4D4843ED637AA785798F404229DE1C66AE9EE38C69BC304
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                                                  • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                  • API String ID: 2868844859-1533471033
                                                                                  • Opcode ID: 51127e303019f1fa10426485046a28b2719f38416803858a6fe94b28818fe22a
                                                                                  • Instruction ID: d39cfb3a262416848dd16da55fc0dd513e03632029399dd0cb01f015099a1414
                                                                                  • Opcode Fuzzy Hash: 51127e303019f1fa10426485046a28b2719f38416803858a6fe94b28818fe22a
                                                                                  • Instruction Fuzzy Hash: C7818873F10A4485FB10DBA5D8403DDA379AB49BD8F40463ADE1967AAAEE74C60BC340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                  • API String ID: 3215553584-2617248754
                                                                                  • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                  • Instruction ID: 2977affbbcdf79b921180af2871a2843dcb246cf5d93472b7931b7a6152f590f
                                                                                  • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                  • Instruction Fuzzy Hash: E6419C73B02B9489FB14CF65E8417CE3BA8E719798F41453AEE9C07B94DA38C266C344
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageObjectSend$ClassDeleteLongName
                                                                                  • String ID: STATIC
                                                                                  • API String ID: 2845197485-1882779555
                                                                                  • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                  • Instruction ID: 901f4aad77273049d8678bf9148895343b45afa08a3115917fd4ac0d05e2314b
                                                                                  • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                  • Instruction Fuzzy Hash: 4431E437B1464082FA64DF12E9547EAA3A9F788BD4F540038DD4A47B96DF3CCA0B8780
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemTextWindow
                                                                                  • String ID: LICENSEDLG
                                                                                  • API String ID: 2478532303-2177901306
                                                                                  • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                  • Instruction ID: c64405f7b759526764301fb8bab5092cca9eac4119e8529beac6771ea4c0105d
                                                                                  • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                                                                                  • Instruction Fuzzy Hash: 97419C33A14A5482FB589B12E8147E967A9A788FC4F14423CDE0A47BA4DF3DCB4B8300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                                  • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                                  • API String ID: 2915667086-2207617598
                                                                                  • Opcode ID: 6794cfd2df2083ddb130d433e4ca33b69faefb70ddab7dfcfa84983386d80e8a
                                                                                  • Instruction ID: 77b31dbca7da3745eb9d483e67458bb4b5489a1835ebc5bd214a6e05e83677d4
                                                                                  • Opcode Fuzzy Hash: 6794cfd2df2083ddb130d433e4ca33b69faefb70ddab7dfcfa84983386d80e8a
                                                                                  • Instruction Fuzzy Hash: CE315B37A05B0480FA249B26A9543EA27A9FB45BA0F45517DCE4A437B8DF38CB87C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: $
                                                                                  • API String ID: 3668304517-227171996
                                                                                  • Opcode ID: fba1bd8aa635f3f6d5198a4fd819999d9510bb129eafd649dd3f86975facee9e
                                                                                  • Instruction ID: 59aa1c713f9aa4be22f1fb352ede33309af18e4113f027a6262468cea5592214
                                                                                  • Opcode Fuzzy Hash: fba1bd8aa635f3f6d5198a4fd819999d9510bb129eafd649dd3f86975facee9e
                                                                                  • Instruction Fuzzy Hash: 92F1B073F11B4480EF009B69D6483EDA36AA744BE8F605629CE6D57BD5EF74C28AC340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                  • String ID: csm$csm$csm
                                                                                  • API String ID: 2940173790-393685449
                                                                                  • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                  • Instruction ID: 50616b0bbb31d73e1117d46852f7eeecc0f795a84313ea643dfffdddf2ac1454
                                                                                  • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                  • Instruction Fuzzy Hash: 80E1A073A00BA08BEB609F75D4803ED7FA8F745768F18412ADE8957796DB34D686CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocClearStringVariant
                                                                                  • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                  • API String ID: 1959693985-3505469590
                                                                                  • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                  • Instruction ID: 46e8577e6fe901a2d468132bbe460295e0cbeb62c971455f9d3d5b69ce8cee51
                                                                                  • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                  • Instruction Fuzzy Hash: 97710C77A10A0485EB20CF25D9907DD77B8FB88BA8F44512AEE4E53B68CF38C645C740
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(?,?,?,000000013FF81573,?,?,?,000000013FF8192A), ref: 000000013FF8162B
                                                                                  • GetProcAddress.KERNEL32(?,?,?,000000013FF81573,?,?,?,000000013FF8192A), ref: 000000013FF81648
                                                                                  • GetProcAddress.KERNEL32(?,?,?,000000013FF81573,?,?,?,000000013FF8192A), ref: 000000013FF81664
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                  • API String ID: 667068680-1718035505
                                                                                  • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                  • Instruction ID: aa1e886de6e6617b1b8f749a937005f23c83e3ace07d406da4c343de87783508
                                                                                  • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                  • Instruction Fuzzy Hash: AE112D33E16B1481FE65AB01AA403E5279D6748BA4F4C563DCD5A463A0EE3CCB97C610
                                                                                  APIs
                                                                                    • Part of subcall function 000000013FF651A4: GetVersionExW.KERNEL32 ref: 000000013FF651D5
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,000000013FF55AB4), ref: 000000013FF6ED8C
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,000000013FF55AB4), ref: 000000013FF6ED98
                                                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,000000013FF55AB4), ref: 000000013FF6EDA8
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,000000013FF55AB4), ref: 000000013FF6EDB6
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,000000013FF55AB4), ref: 000000013FF6EDC4
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,000000013FF55AB4), ref: 000000013FF6EE05
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2092733347-0
                                                                                  • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                  • Instruction ID: 6f1e72c7325fcf0af2052edb373318f7954f363a3b4f4bb801c8407b6d5fb183
                                                                                  • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                  • Instruction Fuzzy Hash: 7C5148B3B106508AEB14CFB9D4403EC37B5F748B98F64402AEE09A7B58DB78D656CB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2092733347-0
                                                                                  • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                  • Instruction ID: fce4193601b592fce2bc511554da8c3062de49a9ae13673c55eec0a306e0daa0
                                                                                  • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                  • Instruction Fuzzy Hash: A0310973B10A5099FB14CFB5D8903ED3774FB08758F54502AEE09A7A58EB78C596C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: .rar$exe$rar$sfx
                                                                                  • API String ID: 3668304517-630704357
                                                                                  • Opcode ID: cd8554260ddee3f68471b11ee4aef8921e4c722a44e964939d6ce9a91093e1e4
                                                                                  • Instruction ID: 1b0b01e1270e7b61be420c3c98b2e79c4b822769fc00fb18f897250585f18b07
                                                                                  • Opcode Fuzzy Hash: cd8554260ddee3f68471b11ee4aef8921e4c722a44e964939d6ce9a91093e1e4
                                                                                  • Instruction Fuzzy Hash: 83A19A33A10A4480EB049F35D9953ED2369BB85BA8F545239DE2A177EADF38C697C340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: abort$CallEncodePointerTranslator
                                                                                  • String ID: MOC$RCC
                                                                                  • API String ID: 2889003569-2084237596
                                                                                  • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                  • Instruction ID: d101fbf43a2e1fff86b401017d4aebd0ab06ed2a883b648c8a75d5ffd9afba00
                                                                                  • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                  • Instruction Fuzzy Hash: 21917F73A04BA48AE711CF65E8803ED7BB4F744798F14412AEF8957B59DB38C296CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                  • String ID: csm$f
                                                                                  • API String ID: 2395640692-629598281
                                                                                  • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                  • Instruction ID: ec16b6c763adf16a0f2034df3697a8fcc4b777837603d4b438d38ed86f0b1cf3
                                                                                  • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                  • Instruction Fuzzy Hash: F651A133B11A2187EB14CF15E844BA93F99F344BA8F598138EE5647788DB75DA43CB40
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                                                  • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                  • API String ID: 2102711378-639343689
                                                                                  • Opcode ID: 7d18d790379317f0803995c178e88ab79334658891d984f74db8c16d37a5e77c
                                                                                  • Instruction ID: d65cffa28a4e310108d7708194439931eb55f2e7a28322a00126d86b5340231a
                                                                                  • Opcode Fuzzy Hash: 7d18d790379317f0803995c178e88ab79334658891d984f74db8c16d37a5e77c
                                                                                  • Instruction Fuzzy Hash: FF51BC73F1565086FB10DBB5D8593ED27B9AB857A4F400139DE1D17BAADE38CA8BC200
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$Rect
                                                                                  • String ID: RarHtmlClassName
                                                                                  • API String ID: 2396740005-1658105358
                                                                                  • Opcode ID: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                  • Instruction ID: 7339c2a6aaa6d191450c8eaa92d4edb33be6093b5e068899af062dda3741e306
                                                                                  • Opcode Fuzzy Hash: 7f8a0b662af83a4f47b362c37f36e9414f73daccdb18f375bc1ce0a7ee57f15d
                                                                                  • Instruction Fuzzy Hash: FD51D633B15B808AEB24DF25E45439AB7A8F789BC4F044539DE8A43B65DF3CD54A8B00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: sfxcmd$sfxpar
                                                                                  • API String ID: 3540648995-3493335439
                                                                                  • Opcode ID: a2f2ff4eec9cd023bea60e191487a3fc7b1107ac2ef23f4bce237efce2fc713f
                                                                                  • Instruction ID: ab830fdd4adb1bbbc82e50e152c867ab1876ad120106d089f4a44fbb404d6126
                                                                                  • Opcode Fuzzy Hash: a2f2ff4eec9cd023bea60e191487a3fc7b1107ac2ef23f4bce237efce2fc713f
                                                                                  • Instruction Fuzzy Hash: 3C314973A10A1484FF048B69E8843DD63B9F788BD8F541129DE6D57BA9EE74C286C384
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                  • API String ID: 0-56093855
                                                                                  • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                  • Instruction ID: 0e5b35eec6515c73d8078293bf7b780a8739ba7a9f392d1ac9af48df76bef54a
                                                                                  • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                  • Instruction Fuzzy Hash: 8121DC37A05B8981FA108B15F8443D5A7A8A349BC8F54063EDD6997365DE38CB9BC340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                  • Instruction ID: eec64f21c7d116bff430c294d7cceb3f0ca1f16fe3537585136b760341ceba65
                                                                                  • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                  • Instruction Fuzzy Hash: 37F06233A15A4181EF458B11F4803EA67A4EB88BD0F84103EDD4B86764DF3CC686C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID:
                                                                                  • API String ID: 3215553584-0
                                                                                  • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                  • Instruction ID: fc4fa21602b3185e9844ad6ac31c2175736254aa003abd7437a49a6763de5031
                                                                                  • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                  • Instruction Fuzzy Hash: 5681EF73F20A5489FB209F659880BEE67A9B7A5B88F40812DCE0A53BD5CB34C647C715
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 2398171386-0
                                                                                  • Opcode ID: 2e61f30820f3e69737d9660ab18874bee1eef0c333cff69c88e9078c01ead55e
                                                                                  • Instruction ID: 624f4b0c635277d7c343e2a102ac233697df6a0335002ba72024238d27d0c319
                                                                                  • Opcode Fuzzy Hash: 2e61f30820f3e69737d9660ab18874bee1eef0c333cff69c88e9078c01ead55e
                                                                                  • Instruction Fuzzy Hash: 6451B073F10A4099FB50CFB5E8403ED63B9A789BB8F404639AE59477E9EE348656C304
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 3659116390-0
                                                                                  • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                  • Instruction ID: 37f49973f55401a8a5ad6809a2710aa8d16e525e61d824f192b1bc225fa01dfb
                                                                                  • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                  • Instruction Fuzzy Hash: 86519E33A10A5089F711CF65E8447DE3BB9F758B98F088129DE4A57BA9DB34C286C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                                  • String ID:
                                                                                  • API String ID: 262959230-0
                                                                                  • Opcode ID: 7e9601d2247a13adf5892490d0984888a090eff7ba9d3fa4ff308a8b8e371313
                                                                                  • Instruction ID: bb1651b017a05053fe5cce11f7a7e08daa6c5ad1bc5a228af9dfb284d669674b
                                                                                  • Opcode Fuzzy Hash: 7e9601d2247a13adf5892490d0984888a090eff7ba9d3fa4ff308a8b8e371313
                                                                                  • Instruction Fuzzy Hash: A841A333A016548AEB54AF75D9503E92A99FB48BA4F54473CEE6D877D5DB38C283C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _set_statfp
                                                                                  • String ID:
                                                                                  • API String ID: 1156100317-0
                                                                                  • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                  • Instruction ID: 4f0f92972c71476d53eb8ccc314064246b821b9b1de181d0d716af98da70fcb2
                                                                                  • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                  • Instruction Fuzzy Hash: 65110C77E10B0D81FA541134E5423FB11CA6B553B0F4C423CEE7A0A6DADA2487474207
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                                  • String ID:
                                                                                  • API String ID: 3621893840-0
                                                                                  • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                  • Instruction ID: bbc128f66cf611852ef552cefdb647517169082706d43cecaf576012c81f0280
                                                                                  • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                  • Instruction Fuzzy Hash: 37F09033F3044982F7148B20E894BAA6229FBE4B49F941034EE4B81994DF3CCB4ACB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: __except_validate_context_recordabort
                                                                                  • String ID: csm$csm
                                                                                  • API String ID: 746414643-3733052814
                                                                                  • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                  • Instruction ID: 78764318d1b142b5c86a3ca029e1317b06ae131dc83e74894c38cdcf288ac5fb
                                                                                  • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                  • Instruction Fuzzy Hash: 6D7194736046A48ADB708F25D4947EDBFA4F305F99F14812AEF4857B89CB38CA96C740
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: $*
                                                                                  • API String ID: 3215553584-3982473090
                                                                                  • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                  • Instruction ID: 59e5596843a91307673c4c028d36d3fecd32c6780dc2616c31c80c283f8785d7
                                                                                  • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                  • Instruction Fuzzy Hash: DF515173914A608AE7698F3886493EC3FA9F746B19F14123ECE46462D9CBB4C683C705
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$StringType
                                                                                  • String ID: $%s
                                                                                  • API String ID: 3586891840-3791308623
                                                                                  • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                  • Instruction ID: 0dd6472f77dc26b5f97ffc7f1e3bc33fd1db2dc61f4b415f3c16de18b1b2bf2e
                                                                                  • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                  • Instruction Fuzzy Hash: 1841A233B10B848AEB619F26D8003DA23A9FB44BE8F480639DE1D477C5DB38C646C304
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                  • String ID: csm
                                                                                  • API String ID: 2466640111-1018135373
                                                                                  • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                  • Instruction ID: b7b95cfc86376ce95e79ff621d6100ec80a5937a4d459e18e17a00d8f8c29d3e
                                                                                  • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                  • Instruction Fuzzy Hash: 9C517E7361576487EA20EF16E4413AE7BA8F789BA0F140128EF8D47B55CF38D562CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                  • String ID: U
                                                                                  • API String ID: 2456169464-4171548499
                                                                                  • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                  • Instruction ID: 8e2e27f15e8eb92475d4cc3c0fe732413e8bac268b084a4878a9ada45adda0c8
                                                                                  • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                  • Instruction Fuzzy Hash: 9F41C633715A8082EB20CF65E8447EA77A4F398794F848139EE4D87798DB7CC546CB40
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectRelease
                                                                                  • String ID:
                                                                                  • API String ID: 1429681911-3916222277
                                                                                  • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                  • Instruction ID: a2afd842f1629be2ca1be8ec16681650f71e07f43278610d285522c466648352
                                                                                  • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                  • Instruction Fuzzy Hash: 39314936A0874486EB08DF12B81875AB7A4F789FD9F504439EE8B43B54CE3CC94ACB00
                                                                                  APIs
                                                                                  • InitializeCriticalSection.KERNEL32(?,?,?,000000013FF7317F,?,?,00001000,000000013FF5E51D), ref: 000000013FF6E8BB
                                                                                  • CreateSemaphoreW.KERNEL32 ref: 000000013FF6E8CB
                                                                                  • CreateEventW.KERNEL32(?,?,?,000000013FF7317F,?,?,00001000,000000013FF5E51D), ref: 000000013FF6E8E4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                  • String ID: Thread pool initialization failed.
                                                                                  • API String ID: 3340455307-2182114853
                                                                                  • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                  • Instruction ID: 73d98cca62ea0b47c35f860f889272d870d75f4ced17348472131efd11a7f599
                                                                                  • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                  • Instruction Fuzzy Hash: 6521BE33E1164086F7508F34E4587DE32A6E798B1CF188039CE094A295DF7E8A97CB88
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDeviceRelease
                                                                                  • String ID:
                                                                                  • API String ID: 127614599-3916222277
                                                                                  • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                  • Instruction ID: f03bade348837fdde68a9d7b53e123e8fe9832d6714c332de1dedacd4c5353b9
                                                                                  • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                  • Instruction Fuzzy Hash: 39E0C232F0464482FB0C57B6F58A32A2261A34CBD0F158039DE1B83794CE3CCDC64300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                                                  • String ID:
                                                                                  • API String ID: 1137671866-0
                                                                                  • Opcode ID: fd4bf53bfdfb75847e8e456477d5ec84f1ccce8e3f545aec7fedd5d5e9a8f738
                                                                                  • Instruction ID: cf82961823d7d1c2d0380d10640f04cef360cee3046db540e2023a449d0398e5
                                                                                  • Opcode Fuzzy Hash: fd4bf53bfdfb75847e8e456477d5ec84f1ccce8e3f545aec7fedd5d5e9a8f738
                                                                                  • Instruction Fuzzy Hash: 84A1B073A15A80C1EA10DB65E8883DE6379FB85794F805229EE9D07BE9DF38C646C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1452528299-0
                                                                                  • Opcode ID: 7936dbe671a94e08b05b2b3b32e462f49504e3c7108ba41fc675490ea87a0fab
                                                                                  • Instruction ID: 87dba223e51720e766b7ab31cc5c3bc225be5e5edd59a44958e32b76416f6722
                                                                                  • Opcode Fuzzy Hash: 7936dbe671a94e08b05b2b3b32e462f49504e3c7108ba41fc675490ea87a0fab
                                                                                  • Instruction Fuzzy Hash: 68517A73B10A4599FB00AF64D8453DD2369EB89BD8F40422A9E1C97BAAEF24C746C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1077098981-0
                                                                                  • Opcode ID: decc2da6846149065e747433b686ffe20880dedc2611ac47de6390cb5f5191d4
                                                                                  • Instruction ID: 6ab935cc9e432f45747ae630e4959b93b76825234ebef35db94ce6d5916d572b
                                                                                  • Opcode Fuzzy Hash: decc2da6846149065e747433b686ffe20880dedc2611ac47de6390cb5f5191d4
                                                                                  • Instruction Fuzzy Hash: 61514033A14B8586EB508F61E4447DEB7B8F784B84F501129EE4A57B58DF3CCA4ACB40
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 4141327611-0
                                                                                  • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                  • Instruction ID: aa298106199a1946e59c6f5ab4d81af7098849518c8f6bb4285ab20af561871c
                                                                                  • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                  • Instruction Fuzzy Hash: CD41A333E047A086FB659F11D1443EDBAA8EF92B94F148139DF5947ADADB78CA438700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 3823481717-0
                                                                                  • Opcode ID: bbac506f016d9360db9e17d2d1671c16b614b755f6a366ad0dc26eec498b4da2
                                                                                  • Instruction ID: 3fccc20f3278d315b1736839b82e23f142a7fc16eefe27e3617d2b124c4b0d65
                                                                                  • Opcode Fuzzy Hash: bbac506f016d9360db9e17d2d1671c16b614b755f6a366ad0dc26eec498b4da2
                                                                                  • Instruction Fuzzy Hash: CE415B73F10A5084FB00CF75E8853DD237ABB45BA8F505229DE5966B99DF74C646C200
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                  • String ID:
                                                                                  • API String ID: 1557788787-0
                                                                                  • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                  • Instruction ID: 2af102a9dba96140cbf7985fbdccb3a6d5870fb3b6c0d28cf8bf8d17cfd7b1ce
                                                                                  • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                  • Instruction Fuzzy Hash: 57216532F14B9082E6649F22644035AB6A9FB94BD4F484139DE9EA3BB4DF38C5538704
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$abort
                                                                                  • String ID:
                                                                                  • API String ID: 1447195878-0
                                                                                  • Opcode ID: a46f80a814de90fc6a6f27f4ba991d7ab4b28824e48526204554d6c2ee2a7ff7
                                                                                  • Instruction ID: db1dda04a264e5f8eabd358e2691aab70727d201351bfe548656818ecf7182aa
                                                                                  • Opcode Fuzzy Hash: a46f80a814de90fc6a6f27f4ba991d7ab4b28824e48526204554d6c2ee2a7ff7
                                                                                  • Instruction Fuzzy Hash: 3F017C33F0165042FF58BB31A69A3ED19AD5F44BD0F14453CDD1A437E6ED28DA078600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDevice$Release
                                                                                  • String ID:
                                                                                  • API String ID: 1035833867-0
                                                                                  • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                  • Instruction ID: 2f77feb4314d988245bbb11a9379c4c59f421d309bdc4c2bded42d8209b5e427
                                                                                  • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                  • Instruction Fuzzy Hash: A4E01272E0170882FF0D5B71A8593562194AB48B45F18443D8C1B47350DD3CCE8BC710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                                                  • String ID: DXGIDebug.dll
                                                                                  • API String ID: 3668304517-540382549
                                                                                  • Opcode ID: 30735fc0874bb79453b7a58344767550bacd8fea16fe076cd684d77636adcf15
                                                                                  • Instruction ID: f4224294ce50462441d44c2daeb7227066571cd2bb2bff2eb20484343265a5e7
                                                                                  • Opcode Fuzzy Hash: 30735fc0874bb79453b7a58344767550bacd8fea16fe076cd684d77636adcf15
                                                                                  • Instruction Fuzzy Hash: DE718B73A10B8086EB14CF25E9443DDB3A8FB54B98F544229DFA907B95DF78D262C304
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo
                                                                                  • String ID: e+000$gfff
                                                                                  • API String ID: 3215553584-3030954782
                                                                                  • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                  • Instruction ID: 06721955f62dd5d2d9a0265cd6b3ee04f3b9fed9d9fb58ace36348e9e571de5b
                                                                                  • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                  • Instruction Fuzzy Hash: EC51F173B147E086E7258B7999413D97F99A381B94F089239CEA887BD6CA2CC946C701
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                                  • String ID: SIZE
                                                                                  • API String ID: 449872665-3243624926
                                                                                  • Opcode ID: 6bf5c94b90f936377cecc09889f3643346e9af6ef61bc9371a2428e611e7cd9c
                                                                                  • Instruction ID: 1863186a0d9d4e731f3913923c392302acd3c2741423ba4d1107a73fb4272c4f
                                                                                  • Opcode Fuzzy Hash: 6bf5c94b90f936377cecc09889f3643346e9af6ef61bc9371a2428e611e7cd9c
                                                                                  • Instruction Fuzzy Hash: 1541A673A2078085EE20DF24E4453EDA3A4E795BA4F504229EF9D466D6EF78C786C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                  • String ID: C:\Users\user\Desktop\0442.pdf.exe
                                                                                  • API String ID: 3307058713-4294395081
                                                                                  • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                  • Instruction ID: b545f8bbee7250cb109d175cba23ae7f46013cbf800f3033cd8f8a505923dc2c
                                                                                  • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                  • Instruction Fuzzy Hash: A7414D33A00A648AEB15DF25A4413ED7BECEB84BD4F55403AEE4A47B95DE35CA83C740
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemText$DialogWindow
                                                                                  • String ID: ASKNEXTVOL
                                                                                  • API String ID: 445417207-3402441367
                                                                                  • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                  • Instruction ID: e777c5b2998591fcb0a3f6ca9decd89e4c57ba4b5f43602e83b36ef0b3ef056f
                                                                                  • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                                                                                  • Instruction Fuzzy Hash: 58418E33B0469482FA249B26E9543EA67A9B789BC4F14013DDE49577A9DE38CA4B8340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide_snwprintf
                                                                                  • String ID: $%s$@%s
                                                                                  • API String ID: 2650857296-834177443
                                                                                  • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                  • Instruction ID: e05307d8c718e5056e986c566b7932a77797eec19d0dc1c640c6bd9c5cca46af
                                                                                  • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                  • Instruction Fuzzy Hash: 4031AFB3B10A8496EA608F66E4407DAA7A8F7447D8F40103AEE0D17795EF39C607C740
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileHandleType
                                                                                  • String ID: @
                                                                                  • API String ID: 3000768030-2766056989
                                                                                  • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                  • Instruction ID: f2dfe559e724405980bf906a4008a816ced3b55be4aae108d71da0857403ad94
                                                                                  • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                  • Instruction Fuzzy Hash: D7219933B047A141EB648B6598903A92E59E785778F28132DDE6B077F4DA39CA83C342
                                                                                  APIs
                                                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,000000013FF81D3E), ref: 000000013FF840BC
                                                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,000000013FF81D3E), ref: 000000013FF84102
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFileHeaderRaise
                                                                                  • String ID: csm
                                                                                  • API String ID: 2573137834-1018135373
                                                                                  • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                  • Instruction ID: 8524ca9b2331be2ee2b58cf2e89e2ff8fe886adce84e0b52fe98bc196282431a
                                                                                  • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                  • Instruction Fuzzy Hash: BA111F33614B4482EB218F15E54079A7BE5F788B94F584225DF8D07B58DF3DC656CB00
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,000000013FF6E95F,?,?,?,000000013FF6463A,?,?,?), ref: 000000013FF6EA63
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,000000013FF6E95F,?,?,?,000000013FF6463A,?,?,?), ref: 000000013FF6EA6E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastObjectSingleWait
                                                                                  • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                  • API String ID: 1211598281-2248577382
                                                                                  • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                  • Instruction ID: a8a23495226b5e12787bb9edaa2ca8d9076aaeffd101800d42ce8adb6a0d2d87
                                                                                  • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                  • Instruction Fuzzy Hash: A7E04633E1180082F610AB30AC867D92218B7A07B0FE00378D93A812F29B288F8BC700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.371204795.000000013FF51000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013FF50000, based on PE: true
                                                                                  • Associated: 00000000.00000002.371180781.000000013FF50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371213216.000000013FF98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFAB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371218611.000000013FFB4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371327083.000000013FFBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371333758.000000013FFBE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.371393428.000000013FFBF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_13ff50000_0442.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindHandleModuleResource
                                                                                  • String ID: RTL
                                                                                  • API String ID: 3537982541-834975271
                                                                                  • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                  • Instruction ID: c723b660f90fa07bd44e04e585ed9eb64142ba803bc8f0539bdbcd963f8b9b6c
                                                                                  • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                  • Instruction Fuzzy Hash: 61D0A7B3F0170082FF294BB1A8493E61654571CF41F88503D8C06063A0EE3CC2DAC750