Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1wYGO0mAN2.exe

Overview

General Information

Sample name:1wYGO0mAN2.exe
renamed because original name is a hash value
Original sample name:436B2F74CD97649E20CED1DC65FB0B95.exe
Analysis ID:1582911
MD5:436b2f74cd97649e20ced1dc65fb0b95
SHA1:f96367071a2f3aa91a6c82968d542c80e670f1fe
SHA256:e5bcb2a1cdf6cab62da5b7c8e8d78c25acb5627be5028fd5499df561fd4f24df
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM autoit script
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Autoit Injector
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Injects a PE file into a foreign processes
Protects its processes via BreakOnTermination flag
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ipconfig to lookup or modify the Windows network settings
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query the security center for anti-virus and firewall products
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 1wYGO0mAN2.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\1wYGO0mAN2.exe" MD5: 436B2F74CD97649E20CED1DC65FB0B95)
    • wscript.exe (PID: 1120 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 3720 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /release MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ipconfig.exe (PID: 5488 cmdline: ipconfig /release MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
      • cmd.exe (PID: 5420 cmdline: "C:\Windows\System32\cmd.exe" /c pjcvfvnncx.icm vvcrvhm.bmp MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • pjcvfvnncx.icm (PID: 2676 cmdline: pjcvfvnncx.icm vvcrvhm.bmp MD5: 0ADB9B817F1DF7807576C2D7068DD931)
          • RegSvcs.exe (PID: 3620 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • cmd.exe (PID: 6540 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /renew MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ipconfig.exe (PID: 6056 cmdline: ipconfig /renew MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "195.26.255.81", "Port": "6606,7707,8808,0077,1996,2106,7777", "Version": "| Edit by Vinom Rat", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "true"}
SourceRuleDescriptionAuthorStrings
00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0xc022:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xc372:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 18 entries
        SourceRuleDescriptionAuthorStrings
        8.3.pjcvfvnncx.icm.197c798.0.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          8.3.pjcvfvnncx.icm.197c798.0.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            8.3.pjcvfvnncx.icm.197c798.0.raw.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0xd188:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0x10038:$a2: Stub.exe
            • 0x100c8:$a2: Stub.exe
            • 0x9904:$a3: get_ActivatePong
            • 0xd3a0:$a4: vmware
            • 0xd218:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0xa927:$a6: get_SslClient
            8.3.pjcvfvnncx.icm.197c798.0.raw.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
            • 0x9904:$str01: get_ActivatePong
            • 0xa927:$str02: get_SslClient
            • 0xa943:$str03: get_TcpClient
            • 0x8df7:$str04: get_SendSync
            • 0x8ef1:$str05: get_IsConnected
            • 0x962d:$str06: set_UseShellExecute
            • 0xd4ae:$str07: Pastebin
            • 0xeb46:$str08: Select * from AntivirusProduct
            • 0x10038:$str09: Stub.exe
            • 0x100c8:$str09: Stub.exe
            • 0xd298:$str10: timeout 3 > NUL
            • 0xd188:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
            • 0xd218:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            8.3.pjcvfvnncx.icm.197c798.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0xd21a:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            Click to see the 14 entries

            System Summary

            barindex
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , ParentImage: C:\Windows\SysWOW64\wscript.exe, ParentProcessId: 1120, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , ProcessId: 3720, ProcessName: cmd.exe
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , ParentImage: C:\Windows\SysWOW64\wscript.exe, ParentProcessId: 1120, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , ProcessId: 3720, ProcessName: cmd.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\1wYGO0mAN2.exe", ParentImage: C:\Users\user\Desktop\1wYGO0mAN2.exe, ParentProcessId: 6576, ParentProcessName: 1wYGO0mAN2.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , ProcessId: 1120, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\1wYGO0mAN2.exe", ParentImage: C:\Users\user\Desktop\1wYGO0mAN2.exe, ParentProcessId: 6576, ParentProcessName: 1wYGO0mAN2.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , ProcessId: 1120, ProcessName: wscript.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\1wYGO0mAN2.exe", ParentImage: C:\Users\user\Desktop\1wYGO0mAN2.exe, ParentProcessId: 6576, ParentProcessName: 1wYGO0mAN2.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , ProcessId: 1120, ProcessName: wscript.exe
            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: pjcvfvnncx.icm vvcrvhm.bmp, CommandLine: pjcvfvnncx.icm vvcrvhm.bmp, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm, NewProcessName: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm, OriginalFileName: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c pjcvfvnncx.icm vvcrvhm.bmp, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5420, ParentProcessName: cmd.exe, ProcessCommandLine: pjcvfvnncx.icm vvcrvhm.bmp, ProcessId: 2676, ProcessName: pjcvfvnncx.icm
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\1wYGO0mAN2.exe", ParentImage: C:\Users\user\Desktop\1wYGO0mAN2.exe, ParentProcessId: 6576, ParentProcessName: 1wYGO0mAN2.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" , ProcessId: 1120, ProcessName: wscript.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-31T20:51:33.222041+010020355951Domain Observed Used for C2 Detected195.26.255.8177192.168.2.549737TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-31T20:51:33.222041+010020356071Domain Observed Used for C2 Detected195.26.255.8177192.168.2.549737TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-31T20:51:33.222041+010028424781Malware Command and Control Activity Detected195.26.255.8177192.168.2.549737TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "195.26.255.81", "Port": "6606,7707,8808,0077,1996,2106,7777", "Version": "| Edit by Vinom Rat", "MutexName": "AsyncMutex_6SI8OkPnk", "Autorun": "false", "Group": "true"}
            Source: 1wYGO0mAN2.exeReversingLabs: Detection: 67%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
            Source: 1wYGO0mAN2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 1wYGO0mAN2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 1wYGO0mAN2.exe
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D6F826 __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00D6F826
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D81630 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,0_2_00D81630
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D91FF8 FindFirstFileExA,0_2_00D91FF8
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053E387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,8_2_0053E387
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0054A0FA
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054A488 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_0054A488
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005465F1 FindFirstFileW,FindNextFileW,FindClose,8_2_005465F1
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0050C642 FindFirstFileExW,8_2_0050C642
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00547247 FindFirstFileW,8_2_00547247
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00547248 FindFirstFileW,FindClose,8_2_00547248
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005472E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,8_2_005472E9
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053D836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0053D836
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053DB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0053DB69
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00549F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00549F9F

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 195.26.255.81:77 -> 192.168.2.5:49737
            Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 195.26.255.81:77 -> 192.168.2.5:49737
            Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 195.26.255.81:77 -> 192.168.2.5:49737
            Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 195.26.255.81:77 -> 192.168.2.5:49737
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPE
            Source: global trafficTCP traffic: 192.168.2.5:49737 -> 195.26.255.81:77
            Source: Joe Sandbox ViewASN Name: KCOM-SPNService-ProviderNetworkex-MistralGB KCOM-SPNService-ProviderNetworkex-MistralGB
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: unknownTCP traffic detected without corresponding DNS query: 195.26.255.81
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054D7A1 InternetReadFile,SetEvent,GetLastError,SetEvent,8_2_0054D7A1
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
            Source: RegSvcs.exe, 0000000D.00000002.4483490736.0000000005BB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: RegSvcs.exe, 0000000D.00000002.4483371017.0000000005B99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabo
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
            Source: RegSvcs.exe, 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drString found in binary or memory: https://www.globalsign.com/repository/0

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pjcvfvnncx.icm PID: 2676, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3620, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054F45C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,8_2_0054F45C
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054F6C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,8_2_0054F6C7
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054F45C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,8_2_0054F45C
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053A54A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,8_2_0053A54A
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00569ED5 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,8_2_00569ED5

            Operating System Destruction

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: 01 00 00 00 Jump to behavior

            System Summary

            barindex
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 3620, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D69B5C: _wcslen,CreateFileW,CloseHandle,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00D69B5C
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00531A91 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,8_2_00531A91
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053F122 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,8_2_0053F122
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7355D0_2_00D7355D
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7B76F0_2_00D7B76F
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D6BF3D0_2_00D6BF3D
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D8C0D60_2_00D8C0D6
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7A0080_2_00D7A008
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D892D00_2_00D892D0
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7C27F0_2_00D7C27F
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D752140_2_00D75214
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7A2220_2_00D7A222
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D943600_2_00D94360
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D986D20_2_00D986D2
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D746CF0_2_00D746CF
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D648AA0_2_00D648AA
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D9480E0_2_00D9480E
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D65AFE0_2_00D65AFE
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7ABC80_2_00D7ABC8
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D67CBA0_2_00D67CBA
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7BC050_2_00D7BC05
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D63D9D0_2_00D63D9D
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D74D320_2_00D74D32
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D8BEA70_2_00D8BEA7
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D75F0B0_2_00D75F0B
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D65F390_2_00D65F39
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F20078_2_004F2007
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F80378_2_004F8037
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004EE0BE8_2_004EE0BE
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004DE1A08_2_004DE1A0
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004D225D8_2_004D225D
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F22C28_2_004F22C2
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0050A28E8_2_0050A28E
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004EC59E8_2_004EC59E
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0055C7A38_2_0055C7A3
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0050E89F8_2_0050E89F
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054291A8_2_0054291A
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00506AFB8_2_00506AFB
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00538B278_2_00538B27
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004FCE308_2_004FCE30
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005071698_2_00507169
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005651D28_2_005651D2
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004D92408_2_004D9240
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004D94998_2_004D9499
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F17248_2_004F1724
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F1A968_2_004F1A96
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004D9B608_2_004D9B60
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F7BAB8_2_004F7BAB
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F1D408_2_004F1D40
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F7DDA8_2_004F7DDA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_019E415813_2_019E4158
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_019E4A2813_2_019E4A28
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_019E5FE813_2_019E5FE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_019E3E1013_2_019E3E10
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_07C31B1013_2_07C31B10
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm 98E4F904F7DE1644E519D09371B8AFCBBF40FF3BD56D76CE4DF48479A4AB884B
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: String function: 00D86630 appears 31 times
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: String function: 00D857A5 appears 34 times
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: String function: 00D857D8 appears 67 times
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: String function: 004EFD60 appears 40 times
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: String function: 004F0DC0 appears 46 times
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs 1wYGO0mAN2.exe
            Source: 1wYGO0mAN2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: RegSvcs.exe PID: 3620, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, cSqZGleJeFOouKW.csBase64 encoded string: 'U4Qta5NOYCAKfRX3jC33qn4iJmvlCu3+2OlNIb1ADi+bvYieIcjUASxy5Hfo/XsgU7sgeUhgbJoLqqK6FQ/5r9OKS7NB9ZwWVp3KswitIvfT9K0q2NNyKFIzjqpcLCva', 'k7K5ec59J6HG1d81wJWz4Ic4HulFyNRW3RGnTifOLJwybrjai/FKGT6BmKJll6227+dWDp0iw4AFIjjVC/UrKA==', 's7rNf6/P8RM612hbWaxbCsb08OwXa34ps3eEDuZZY7IeY2pYcxpjoLBsSy/NzP9gOJmy/tfMwY9cl9YTFkew6wIppiVgdh/eNfo+DBcw07k=', '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', 'jQ/BmvL3ZCQLV4bB+QYYm7GW6hANmnzIA4Y6ukYIrlJ4Js6dp/GISJc138goE8jgchUQQqzT7ySejVuWvihZ4SXoyFtz6YLkDbG7/gazS1TaX+OQLiDzWtuOtABEMFBU7E4DnGu7VvRnMr/YevA6ugNI4cAqdUyk76fhx1rz7Y9aGWzaiELaJm+llyU8HDDqurzLQJ7NXjM4+b81VIiZ4PMB0yxe3KQJlD83597oCSMkMASxP1GMi0V6tHFq0gdCMlfLc0fX5oyyw2o8H+CxdlXQqI7lmi40T8nWXevid+GVxJIe4nQhT9x
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, cSqZGleJeFOouKW.csBase64 encoded string: 'U4Qta5NOYCAKfRX3jC33qn4iJmvlCu3+2OlNIb1ADi+bvYieIcjUASxy5Hfo/XsgU7sgeUhgbJoLqqK6FQ/5r9OKS7NB9ZwWVp3KswitIvfT9K0q2NNyKFIzjqpcLCva', 'k7K5ec59J6HG1d81wJWz4Ic4HulFyNRW3RGnTifOLJwybrjai/FKGT6BmKJll6227+dWDp0iw4AFIjjVC/UrKA==', 's7rNf6/P8RM612hbWaxbCsb08OwXa34ps3eEDuZZY7IeY2pYcxpjoLBsSy/NzP9gOJmy/tfMwY9cl9YTFkew6wIppiVgdh/eNfo+DBcw07k=', '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', 'jQ/BmvL3ZCQLV4bB+QYYm7GW6hANmnzIA4Y6ukYIrlJ4Js6dp/GISJc138goE8jgchUQQqzT7ySejVuWvihZ4SXoyFtz6YLkDbG7/gazS1TaX+OQLiDzWtuOtABEMFBU7E4DnGu7VvRnMr/YevA6ugNI4cAqdUyk76fhx1rz7Y9aGWzaiELaJm+llyU8HDDqurzLQJ7NXjM4+b81VIiZ4PMB0yxe3KQJlD83597oCSMkMASxP1GMi0V6tHFq0gdCMlfLc0fX5oyyw2o8H+CxdlXQqI7lmi40T8nWXevid+GVxJIe4nQhT9x
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, RsIiOhNZgBqD.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, RsIiOhNZgBqD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, RsIiOhNZgBqD.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, RsIiOhNZgBqD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@20/31@0/1
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D6932C GetLastError,FormatMessageW,_wcslen,LocalFree,0_2_00D6932C
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053194F AdjustTokenPrivileges,CloseHandle,8_2_0053194F
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00531F53 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,8_2_00531F53
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00545B27 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,8_2_00545B27
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053DC9C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,8_2_0053DC9C
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00554089 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,8_2_00554089
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D7EBD3 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00D7EBD3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1856:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1276:120:WilError_03
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCommand line argument: sfxname0_2_00D8454A
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCommand line argument: sfxstime0_2_00D8454A
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCommand line argument: STARTDLG0_2_00D8454A
            Source: 1wYGO0mAN2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 1wYGO0mAN2.exeReversingLabs: Detection: 67%
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeFile read: C:\Users\user\Desktop\1wYGO0mAN2.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\1wYGO0mAN2.exe "C:\Users\user\Desktop\1wYGO0mAN2.exe"
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c pjcvfvnncx.icm vvcrvhm.bmp
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm pjcvfvnncx.icm vvcrvhm.bmp
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renew
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c pjcvfvnncx.icm vvcrvhm.bmpJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm pjcvfvnncx.icm vvcrvhm.bmpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: dxgidebug.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: ntshrui.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: 1wYGO0mAN2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: 1wYGO0mAN2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: 1wYGO0mAN2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: 1wYGO0mAN2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: 1wYGO0mAN2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: 1wYGO0mAN2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: 1wYGO0mAN2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: 1wYGO0mAN2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 1wYGO0mAN2.exe
            Source: 1wYGO0mAN2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 1wYGO0mAN2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 1wYGO0mAN2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 1wYGO0mAN2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 1wYGO0mAN2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, MbvpxzoYoElhnE.cs.Net Code: xnzMYjnJtuXB System.AppDomain.Load(byte[])
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, MbvpxzoYoElhnE.cs.Net Code: xnzMYjnJtuXB System.AppDomain.Load(byte[])
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004D5D78 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,8_2_004D5D78
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_7402343Jump to behavior
            Source: 1wYGO0mAN2.exeStatic PE information: section name: .didat
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D86680 push ecx; ret 0_2_00D86693
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D85773 push ecx; ret 0_2_00D85786
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00520332 push edi; ret 8_2_00520333
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F0E06 push ecx; ret 8_2_004F0E19
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004EDBF6 push cs; iretd 8_2_004EDBFD
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_07C32968 push esp; retf 13_2_07C32975
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_07C3193A push esp; retf 13_2_07C31941
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_07C328F0 pushad ; retf 13_2_07C328FD
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, nEUsGCMtCWeF.csHigh entropy of concatenated method names: 'MkcRCSWyaQ', 'QJrsxPjyHPP', 'aqxJnMSPXGzizqqE', 'BdiZOqLbMQAS', 'fvjMXFzRonmCT', 'HtyOywHBFsudJzv', 'xClNxgMlMfLm', 'aeSEXTiqerkRs', 'xhCRVbSciuMm', 'JDxUVjtXpVIckT'
            Source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, utoIMOcfPuYy.csHigh entropy of concatenated method names: 'OERpoxwXlZYf', 'ddFaDMrhFJfCyvv', 'DbnvmKANtKCZBK', 'TKQelXawMCLja', 'sqKyuhccwsYU', 'QrIYISIdbPF', 'FcfYiHtDofMwv', 'WVjMeBvRagZAQF', 'mqsMnazHHfpS', 'mCSmJupfHPx'
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, nEUsGCMtCWeF.csHigh entropy of concatenated method names: 'MkcRCSWyaQ', 'QJrsxPjyHPP', 'aqxJnMSPXGzizqqE', 'BdiZOqLbMQAS', 'fvjMXFzRonmCT', 'HtyOywHBFsudJzv', 'xClNxgMlMfLm', 'aeSEXTiqerkRs', 'xhCRVbSciuMm', 'JDxUVjtXpVIckT'
            Source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, utoIMOcfPuYy.csHigh entropy of concatenated method names: 'OERpoxwXlZYf', 'ddFaDMrhFJfCyvv', 'DbnvmKANtKCZBK', 'TKQelXawMCLja', 'sqKyuhccwsYU', 'QrIYISIdbPF', 'FcfYiHtDofMwv', 'WVjMeBvRagZAQF', 'mqsMnazHHfpS', 'mCSmJupfHPx'

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmJump to dropped file
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pjcvfvnncx.icm PID: 2676, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3620, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005625A0 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,8_2_005625A0
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004EFC8A GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,8_2_004EFC8A
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: pjcvfvnncx.icm PID: 2676, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: pjcvfvnncx.icm PID: 2676, type: MEMORYSTR
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pjcvfvnncx.icm PID: 2676, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3620, type: MEMORYSTR
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: pjcvfvnncx.icm, 00000008.00000003.2250994867.000000000183A000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2253756718.0000000001843000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246774402.0000000001836000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246712346.000000000182D000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2183627043.0000000001814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("REGSHOT.EXE")
            Source: pjcvfvnncx.icm, 00000008.00000003.2253949553.0000000001840000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2250994867.000000000183A000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246774402.0000000001836000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246712346.000000000182D000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000002.2255045252.0000000001841000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2183627043.0000000001814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("PROCESSHACKER.EXE").H%
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, vvcrvhm.bmp.0.drBinary or memory string: IF PROCESSEXISTS("REGSHOT.EXE") THEN
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251145527.00000000018D0000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251485137.00000000018DA000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXE'T
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251145527.00000000018D0000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251485137.00000000018DA000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEQT
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, vvcrvhm.bmp.0.drBinary or memory string: PROCESSCLOSE("REGSHOT.EXE")
            Source: pjcvfvnncx.icm, 00000008.00000003.2246712346.0000000001867000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000002.2255067581.0000000001867000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2183627043.0000000001867000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2253756718.0000000001867000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IF PROCESSEXISTS("REGSHOT.EXE") THEN
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251145527.00000000018D0000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251485137.00000000018DA000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXES
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, vvcrvhm.bmp.0.drBinary or memory string: PROCESSCLOSE("PROCESSHACKER.EXE")
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9555Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmAPI coverage: 4.7 %
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D6F826 __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00D6F826
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D81630 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,0_2_00D81630
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D91FF8 FindFirstFileExA,0_2_00D91FF8
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053E387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,8_2_0053E387
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0054A0FA
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054A488 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_0054A488
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005465F1 FindFirstFileW,FindNextFileW,FindClose,8_2_005465F1
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0050C642 FindFirstFileExW,8_2_0050C642
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00547247 FindFirstFileW,8_2_00547247
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00547248 FindFirstFileW,FindClose,8_2_00547248
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005472E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,8_2_005472E9
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053D836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0053D836
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053DB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0053DB69
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00549F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00549F9F
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D84E14 VirtualQuery,GetSystemInfo,0_2_00D84E14
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: pjcvfvnncx.icm, 00000008.00000003.2246712346.000000000182D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VboxService.exe") Then
            Source: RegSvcs.exe, 0000000D.00000002.4483490736.0000000005BB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!+
            Source: RegSvcs.exe, 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: pjcvfvnncx.icm, 00000008.00000003.2246712346.000000000182D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareService.exe") Then"
            Source: pjcvfvnncx.icm, 00000008.00000003.2183627043.0000000001814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareService.exe") ThenU$0
            Source: vvcrvhm.bmp.0.drBinary or memory string: If ProcessExists("VboxService.exe") Then
            Source: pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareService.exe536C7
            Source: pjcvfvnncx.icm, 00000008.00000003.2183627043.0000000001814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Thenc$0
            Source: vvcrvhm.bmp.0.drBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Then
            Source: pjcvfvnncx.icm, 00000008.00000003.2253211058.000000000187E000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251598278.0000000001872000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2253333297.0000000001882000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxTray.exe
            Source: pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareUser.exe;
            Source: pjcvfvnncx.icm, 00000008.00000003.2183627043.0000000001814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VboxService.exe") Thend$0
            Source: pjcvfvnncx.icm, 00000008.00000003.2246712346.000000000182D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Then
            Source: vvcrvhm.bmp.0.drBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareService.exe") Then
            Source: pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VboxService.exe
            Source: pjcvfvnncx.icm, 00000008.00000003.2253549764.0000000001827000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2253622931.0000000001827000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2253995330.0000000001827000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2250969174.0000000001826000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000002.2254880056.0000000001827000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2183627043.0000000001814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VBoxTray.exe") Then
            Source: vvcrvhm.bmp.0.drBinary or memory string: If ProcessExists("VBoxTray.exe") Then
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeAPI call chain: ExitProcess graph end nodegraph_0-29940
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 13_2_019E1CE8 CheckRemoteDebuggerPresent,13_2_019E1CE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0054F3FF BlockInput,8_2_0054F3FF
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D86878 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D86878
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004D5D78 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,8_2_004D5D78
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D8ECAA mov eax, dword ptr fs:[00000030h]0_2_00D8ECAA
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F5078 mov eax, dword ptr fs:[00000030h]8_2_004F5078
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D92CE0 GetProcessHeap,0_2_00D92CE0
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D86878 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D86878
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D8AAC4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D8AAC4
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D86A0B SetUnhandledExceptionFilter,0_2_00D86A0B
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D85BBF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D85BBF
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005029B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_005029B2
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F0BCF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_004F0BCF
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F0D65 SetUnhandledExceptionFilter,8_2_004F0D65
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004F0FB1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_004F0FB1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F00000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F00000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F00000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C9E000Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00531A91 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,8_2_00531A91
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_004D3312 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,8_2_004D3312
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: winmgmts:\\localhost\root\securitycenter25733c/648b7/3wwmemstr_7ccce17a-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9da3ef5a7537d61269990e1314a9367a9627b43cd06inmemstr_46217684-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\c:\users\user\appdata\local\temp\rarsfx0\ogjh.binmemstr_42702854-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -command add-mppreference -exclusionpath "wmemstr_f5b0b637-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9da07ca89775d4d1b92a6dc1e62af4b9c434069fa3wmemstr_8bd96878-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: c:\users\user\appdata\local\temp\rarsfx0\ogjh.binnsimemstr_3f3e5655-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9de0fe3ac427d6126889cf81544926f9a737e43c006memstr_cc4ae65e-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: jthzmqqiaytoymaujnudhh.exememstr_8247d08b-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: numberofrvaandsizesnrsionl\temp\rarsfx0\smmetgr.fqgmemstr_5eb0d217-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9db20eeab5f7c770ab38aea25559365ae7f7e49faivmemstr_854d62c7-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ssssss$vmemstr_f1923ee5-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: powershellememstr_82062acb-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: process explorermemstr_24dc1b46-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regshot.exesmemstr_2d72de3a-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: antivirusfumemstr_0ae54c39-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.execumemstr_e1db43d0-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: colitems|umemstr_12b2df31-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ssssss2umemstr_8ce02d0c-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: objantivirusproductmemstr_dd0836f3-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: usbrnmemstr_21598fbf-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: taskmgr.exettmemstr_6fc743b5-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processhacker.exeqtmemstr_24cb74fe-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regshot.exe'tmemstr_a7e12707-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: antianalysismemstr_71c7e8d4-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: smartsniffmemstr_d653da9f-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ssssssmemstr_cdc175b1-b
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: disablermemstr_8b9524b3-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp64.exebmemstr_46e634b9-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: process hackermemstr_f77758ec-b
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: taskmgr.exes5memstr_d38679a0-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wiresharkmemstr_39ae6c90-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: smartsniff~memstr_285775a5-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tcpeyeememstr_5c303894-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tcpeye.exeememstr_601de9af-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gwk&c[?memstr_5581d11b-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tcpeyetsmemstr_24713f29-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h[t@t^tmemstr_9eaf964f-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h[t@t^tkmemstr_263f5bc8-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_allocateexespacememstr_a25e74e5-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: errorcmemstr_39ad6a03-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9cf2de6a45c41memstr_44b87440-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9cf2de6a45c41mmemstr_470c9eca-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c71ce2a4516c7b23a3b4e02140b8fmemstr_30dd819f-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_fixrelocmemstr_b4fc6a3a-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9da07ca89775d4d1787aaca0877a44687555378ea1030299memstr_9aed884f-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9de0ae6bc5141memstr_3392e7a4-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c71deeb25541[memstr_fdb04275-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c70ae2a444794btmemstr_86b50639-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kernel32.dllmemstr_4ad27d42-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c717*memstr_a102fbf8-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9da07ca89775d4d1787aaca0877a44687555378ea103029memstr_e159b6d4-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9da3ef5a7537d61269990e1314a9367a9627b43cd06memstr_792182e0-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9da0be9ba597d610cmemstr_b0c6af75-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c708eba95741memstr_a3db6c6d-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_allocateexespaceataddressmemstr_a00fc81a-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c70ae6bc5141lmemstr_6630f1ad-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9cf2de6a45c41imemstr_c3d4881c-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: errormemstr_fb5db13d-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c70ae6bc5141memstr_30bb6b10-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9cf2de6a45c418memstr_af4372b1-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bufferasmetdataamemstr_e7644956-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellzmemstr_09f0a859-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_unmapviewofsectionwmemstr_86eb5e5c-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __runpememstr_bbd57b33-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: binary-memstr_528cc274-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_iswow64processmemstr_9ba534a0-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: binbufferetdatamemstr_6c0a65a8-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ssssssomemstr_195132fc-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sssssshmemstr_ff479f37-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bufferasm;memstr_d7cd8806-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ntdll.dllmemstr_f384bdd7-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9cf2de6a45c41@memstr_2b8028b1-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: binbuffer]memstr_4f849b70-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: errorv&8memstr_47871313-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: egxui.exelhandled admemstr_00e4dcc8-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _crypt_decryptdatamemstr_96e8ea7a-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __crypt_refcountdecadmemstr_24370b58-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: execquery////6b//65//7,memstr_8bbc6774-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: displayname5memstr_adab1f81-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avastui.exeountdec:memstr_0b7954a4-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __crypt_dllhandlememstr_3f42b441-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avastsvc.exexreloc admemstr_716b4f8b-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgui.exememstr_5fb3ea27-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgsvc.exelocalhost\romemstr_4be846cd-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exememstr_22749c51-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scriptdirmemstr_0a86764b-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __crypt_dllhandlesetrememstr_d6a112c9-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3499bfda1b69b8irpcmemstr_81423772-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sssssseplacememstr_5bf42727-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __crypt_refcountecrusmemstr_73a308f9-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _crypt_derivekey851e87memstr_0433928e-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __crypt_refcountincmemstr_37a3f77b-b
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x385xxx6f9fe1cc8047cmemstr_3f257c5a-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y08644747068671a053hamemstr_9f48d254-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sexemodulefmemstr_0564217b-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: binbufferetptromemstr_8ce7dfcd-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: disablesysrestorend adtmemstr_c17f6f5b-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_fixrelocad]memstr_0bbd304f-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __crypt_contextsetbmemstr_5de34e36-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: colitemskmemstr_186b18e9-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: virtualallocexpmemstr_ca28885e-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: iswow64process5a7537d6ymemstr_8e69e1a7-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kernel32.dll~memstr_13a754c2-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ntunmapviewofsection#memstr_d212d44c-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c708eba95741(memstr_820c214c-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9cf2de6a45c411memstr_7ddb963e-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: virtualallocex?memstr_7052d2da-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dword_ptrmemstr_d70d7343-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sizeofblockmemstr_36ef6d8f-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dword_ptrc61ef5a7537d6memstr_23b9a63b-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: word[uctcreatea4516c7memstr_09056260-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c71deeb25541memstr_8a16d7a2-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c717a89775d4memstr_dd9a5577-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ptrtructcreatea5527d6memstr_4302a85a-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: virtualaddressmemstr_281b0b77-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kernel32.dllef5a7537d6memstr_774634c0-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kernel32.dllfe3ac427d6memstr_440777bc-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _y0x3856f9c71deeb25541bmemstr_b47ee898-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: virtualallocexeb255777kmemstr_2eb33a4e-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: user32.dllpmemstr_2b0f4a84-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: byte[uctcreateymemstr_9249069b-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: byte[uctcreate^memstr_626c692c-b
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: asmrylengmemstr_66d30478-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ndowprocwlmemstr_1c0f7c6c-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bufferasmetptrumemstr_14b1e93c-b
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sexemodulezmemstr_8abcbc0f-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: binaryenmemstr_95e73905-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 68`n|memstr_05fa0864-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: threadmemstr_f0f6b886-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sw_hidememstr_8959ffca-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: machinememstr_66efff86-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processmemstr_d968f3be-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sparememstr_a1c2b102-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mutantpmemstr_5a443a6f-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: magicdmemstr_619f10a8-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: magicmemstr_28157205-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0x65memstr_1a393e7f-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0x3h5memstr_41cd08df-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ptrel3memstr_4c6faa26-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0x@f5[memstr_da6c31a5-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: handlebmemstr_e49b3cdf-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ptrualmmemstr_f566a7d1-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dwordmemstr_80c5f8df-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pagesmemstr_0f625408-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: handlememstr_404f26d9-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ssword}memstr_3715515c-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ptr3@memstr_4d6cc857-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dword5gmemstr_b0443807-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: checkinsmemstr_4372ead9-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mutexpymemstr_7617ef9d-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: loopinmemstr_80ea17b4-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: runoncememstr_d6784ff3-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _msgboxmemstr_e43fe301-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dr68hmemstr_9ea160d7-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mainpememstr_c88d1524-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: denariomemstr_96e7d9a2-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: delaye$memstr_c01a8697-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startup/memstr_a67713fc-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runpememstr_a78ac3e1-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: prochmemstr_84c20bf2-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: inte(memstr_95a34351-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellmemstr_491dec83-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exememstr_6a3aa63c-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bool*(memstr_e12e1f50-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ncalrpcmemstr_b57cd6d7-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 302494memstr_a957ded9-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exestmemstr_72ae4aaa-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: teg@omemstr_a02dabd7-5
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: binary6memstr_8e6842cd-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tagwordmemstr_6134af75-b
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: overlaymemstr_112fc281-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startupmemstr_68e43c34-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startup^memstr_4a3db20b-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: binarymemstr_c57b0c54-e
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runpehmemstr_e06e87a7-f
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mutexmemstr_b3660194-8
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellokmemstr_696fd80f-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: closeqmemstr_0d62a002-b
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msgboxxmemstr_82fc2426-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: checkinmemstr_6ff29b3a-1
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: callwimemstr_7d317c06-9
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: uwrb0memstr_aac1fddf-7
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: segcsmemstr_d2a3fbb2-2
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: eflagstmemstr_62568b34-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: segssmemstr_7a70d783-d
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: titlexmemstr_2ea2005a-0
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: desktopmemstr_18e4370e-c
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sw_hide5memstr_36f89573-a
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cbsizememstr_4f256d0e-4
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xsizememstr_8ecd7271-6
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: flags0memstr_294b1866-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ysizememstr_ddf0b74a-3
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: spare2memstr_e3595707-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2185471708.0000000001794000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \registry\machine\software\wow6432node\microsoft\windows\currentversion\explorer\knownfoldersettings\registry\machine\software\wow6432node\microsoft\windows\currentversion\explorer\knownfoldersettingsgmemstr_0143a767-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2185471708.0000000001794000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: y\machine\software\microsoft\windows\currentversion\explorer\knownfoldersettingsmemstr_efef80fd-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .textmemstr_63c6a0ff-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h.textmemstr_ad3b9f50-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: `.rsrcmemstr_1ed66261-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: `.rsrcmemstr_df80c806-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @.relocmemstr_76bda1cb-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @@.relocmemstr_12b44bf7-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xc=vdmemstr_0751fbc9-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9a./\memstr_cd3d188e-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %r="pomemstr_67f6288f-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ru"pomemstr_64f31d63-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r/"p((memstr_41b43038-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rk"pomemstr_4f23ce72-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %re"pomemstr_b3871078-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rw"po`memstr_3ce87365-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &8r~hmemstr_ecfabdf5-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rm#p(kmemstr_7070d1c5-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rq#p(rmemstr_94f7c2c4-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r{#potmemstr_e2af57d2-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: *adq(ymemstr_806eed43-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r5$pomemstr_7ca6529c-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ro$p((memstr_3db903c3-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9$r{$pomemstr_f0e6a02e-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r{$pomemstr_2191bb69-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r="pomemstr_43012b5f-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r/%p(memstr_b09c6d3b-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r3%pr=%pomemstr_3a149a04-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ri%pru%pomemstr_886e3ae5-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ra%pomemstr_dbb272da-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rk%pomemstr_6de96eac-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rw%prk%pomemstr_2d99032c-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ri%pomemstr_f7e80756-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rm)p(rmemstr_4dd73a8d-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r(*p(rmemstr_b17c6cde-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rw0pomemstr_cff4d34c-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rh1pomemstr_72f6a47f-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ry2pomemstr_e07ef54d-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ry2pomemstr_67d169a8-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rn3pomemstr_d987716c-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rh3pomemstr_4c0ed5ff-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r74pomemstr_6831f677-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rq4pomemstr_b047efac-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ri4p(rmemstr_b8aa469a-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r 5pomemstr_bed6c4ee-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r<5pomemstr_e525052a-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rv5p(rmemstr_64854e92-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r#6pomemstr_1a7769af-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r76p(rmemstr_b325f049-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r07p(rmemstr_08eb058a-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r%8pomemstr_de1f3f0d-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r=8pomemstr_41263f62-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rs8p(rmemstr_00755df7-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rm8pomemstr_f4d4b54e-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r19pomemstr_4d46e825-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ra9p(rmemstr_1709d5e5-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rs9pomemstr_a29b0cf0-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rm9pomemstr_13028769-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: re"pomemstr_fa403218-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: =%rm:pmemstr_2e668a01-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rq:p(kmemstr_373451aa-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ru:p((memstr_0e2b87dc-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ra:p((memstr_4318096e-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ro:p((memstr_84fef7f5-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r}:p((memstr_f5d91078-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8or!;pmemstr_a9c56e1c-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8dr-;pmemstr_e9d98bd7-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8yr-;pmemstr_b3aaf3e0-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8nr;;pmemstr_84453144-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8cr;;pmemstr_976e0502-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 88rk;pmemstr_cd2c5c24-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8-ry;pmemstr_41d3f043-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8"re;pmemstr_55da1ca9-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: yl#n@[(memstr_a048232e-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: yl#8@[(memstr_023d92d9-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r=<psmemstr_9508c655-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r{<pomemstr_ffa2ea35-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hou;&memstr_49480a62-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r)=p((memstr_c9fae74d-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rg=p((memstr_9b699578-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rw=p((memstr_68130f5f-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rk=p((memstr_bae326bb-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r'>p((memstr_b40e430d-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r5>p((memstr_a0075332-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ra>p((memstr_b32bd2d0-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rw>pomemstr_960d8a21-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r_>pomemstr_8605c4a2-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ru>pomemstr_975e1a93-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r)=pomemstr_75e69e1d-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rg=pomemstr_3e79a7ca-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r!?pomemstr_23bbe306-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r+?pomemstr_5f1519af-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r1?pomemstr_7c47564a-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r_?pomemstr_13283d40-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ri?pomemstr_d8954c97-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rs?pomemstr_998eab16-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r'>pomemstr_7977aa8a-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %r#@po`memstr_f51f216d-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %r3@podmemstr_362dfd68-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rw@pomemstr_4cab46c3-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rmapsmemstr_a7e5e42e-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r{apsmemstr_0d06c166-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: k8iz8fmemstr_78156082-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rr'3@8mmemstr_5ea43324-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nn'8ib8imemstr_346a9134-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r#bps-memstr_06518d1b-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0btfymemstr_5b53074a-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: v4.0.30319memstr_0ed2c7ad-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ##~@$memstr_337f4c37-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #stringsmemstr_f09d77dd-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .#stringsmemstr_910f2d5b-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rlb#ushmemstr_99215831-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #guidmemstr_7a4fbedc-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #guidxmemstr_9f6f6ebe-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #blobmemstr_72f5213a-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: >fumemstr_e7f3bb58-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: p ap [memstr_daefed8c-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: action`10memstr_3009281e-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <read>b__0memstr_e6271b1c-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <read>b__2_1memstr_45042869-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ienumerable`1memstr_801c2b0c-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: callsite`1memstr_f737c227-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: list`1memstr_5403e105-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.win32memstr_2bbb9a3b-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: user32memstr_f7db1608-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: touint32memstr_277ed754-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readint32memstr_d8f5c4df-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: toint32memstr_1e779ac9-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: x509certificate2memstr_a37e3b01-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: touint64memstr_16b160d0-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: toint64memstr_182cd927-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: touint16memstr_4c19f89f-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: toint16memstr_881bda7b-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hmacsha256memstr_2d0b924c-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: get_utf8memstr_366c01e8-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <module>memstr_52b9147a-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: yfgljoecjvmfamemstr_788c6387-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: faobyadxqytamemstr_f6ced5f8-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: belvobibzgadamemstr_86b3ef0c-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: yksxqkwrlbkfamemstr_492ee22c-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: systemparametersinfoamemstr_8c1f372c-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nkgwkjknramemstr_668aa29e-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nlkkhobopramemstr_33d31727-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: whmjkplioaixusamemstr_983309a7-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pmwgcbpncbmemstr_a667cf34-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: noqtjyclkwfbmemstr_21d22a68-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lwapoxsfibmemstr_eddfc4ce-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: jkvfzcwvrqmhvbmemstr_c3e9bec8-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xnzmyjnjtuxbmemstr_02a1cb3b-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cdxpjqodbsbcybmemstr_f298e7bc-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: thjntaljsdbmemstr_6363ba77-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xlcobtrxexewugbmemstr_e3a7a6ca-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: egshoskepeukbmemstr_9fb42058-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xxdptrvbqkqunbmemstr_abdd90ad-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hixvzvidjwqbmemstr_31b0edc6-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: esbclkbdtsbmemstr_e87c602b-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cbzplrrrgucmemstr_c5f6a3bb-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sknopdtcqzcmemstr_9afa0f38-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: whmqemhfdwhyexpdhdmemstr_a3f130ab-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mapnametooidmemstr_91b17463-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: get_formatidmemstr_66d172e1-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lhginhyfgltdmemstr_7fd0422f-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zzviigyurnarmdmemstr_6e42832e-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rsiiohnzgbqdmemstr_6858aa8a-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ltfcyggmwgrdmemstr_42e111fc-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xzaaahurfrmeydmemstr_52af83a9-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ewtzbvktqidememstr_9a841df4-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nxzmdvrfxmoweememstr_d9ec1646-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mbvpxzoyoelhnememstr_295a2347-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: aqxjnmspxgzizqqememstr_c1e6ce0d-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: chpxxdzxcccxrememstr_5ca5da9a-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qmwfiobriohafmemstr_7dc22c92-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rgmlxnerlifmemstr_b9134358-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lmublyyctteqmxnfmemstr_2a647d60-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: delxirbykvmnfmemstr_21a7da2f-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: skhxdqbznfmemstr_d900e8f9-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qriyisidbpfmemstr_0336054c-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wvjmebvragzaqfmemstr_9c2db5ca-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ndtutnbelwfmemstr_c56f7bc5-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: neusgcmtcwefmemstr_c5cc1626-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xsghlwoctlfmemstr_71def095-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shtxwcdrqqmfmemstr_10d080dc-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ivrbvdfnhkmhagmemstr_2992eb05-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dplvoyazigycgmemstr_5bbd758d-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cfqkmiaekfdgmemstr_4de6e7e8-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: iljmhamnigmemstr_4b59b5ea-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rdwtmovixqogmemstr_cdc27a55-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: azhoarzzpvhlvogmemstr_6457c457-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mvejgtnbewpgmemstr_b951b0bf-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: uapfvsfiugmemstr_afcc9570-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qlavravchghmemstr_c2e8da36-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: snbrigletkvhzihmemstr_ee397f69-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: syxazogkcnhmemstr_b7376cbf-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: threcskyihewphmemstr_7bef7add-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qjsecsznsnvhmemstr_46b52cca-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mnkdysxugjcbehmemstr_bfe35997-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: iysnnfqosfhmemstr_9b7c7579-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mbfvimjkkhrghmemstr_d93b96ae-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ikvenwbphqzhhmemstr_71c42e03-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nxrozzcxakkauhmemstr_6d46d29d-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: yixzaotyopbzhmemstr_0b4aba8c-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tboxobnnneounoaimemstr_5b866232-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: erbiderkturseimemstr_531cc730-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: get_asciimemstr_ec36241c-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cworiungbikimemstr_5d2b81ea-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vzjxdhcqxjyivtimemstr_4d22c555-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qbfzhchttxkwuimemstr_f88e027e-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hcixesvwaitqjiimemstr_4c7b0ed3-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kmbmsubkcjmemstr_d9cc87af-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: osyqvlaqdzrcjjmemstr_131d8fcd-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sbpbufgrnvbgvjmemstr_9c739245-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zejnqjdrewjmemstr_01bc3037-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fcyaeaayxajmemstr_46cf42a7-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: peudmykjogjmemstr_6de67f00-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hhexjcanagwjmemstr_5663852b-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dbnvmkantkczbkmemstr_d6e9cff0-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ngtdyvcdnqkmemstr_2d77effe-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ipveyfwavokmemstr_c09bc6be-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ccyclhnedwadblmemstr_283fd012-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kaookfuxrjpqwbllmemstr_df06789a-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nsufmvajxawbonlmemstr_6e3323c8-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wyhgijkewpqanlmemstr_eb77951d-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fgqaggzxnlmemstr_889bca42-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: thcotjcuyqlmemstr_f708d2f8-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kxrkumvcqdlmemstr_4e22a8ac-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hujvfvmzluyjlmemstr_810a3a6c-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wgrdkvcmodhvmlmemstr_9d027e57-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ehgzbldvimolmemstr_d3add69e-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: jtavkveeruvulkwlmemstr_4951fd67-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: krzfsdlolbcrvhammemstr_806a90a6-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ifqwssdmtewgmmemstr_ba8a8f50-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dcphyggbmmmemstr_e244dc85-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rceagoyvgxmmmemstr_d17df72b-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zmtmexagceeknmmemstr_ba1fe2db-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: quzajxbaxepbtmmemstr_f70c2054-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: autoklygsqwmmemstr_56700333-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: syxubsyltxmmemstr_36fc126f-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oxmzimjdbmmemstr_70691d59-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wvxgrkyplvhimmemstr_b08c5a8d-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mwjnifkuffnknmemstr_f9ffc9c8-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rtgjemnpgcwnmemstr_2f69cbc9-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gpqhpyipxffnmemstr_9ae93453-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gzabgxvpeemnmemstr_11e870af-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pzgmqvtufznnmemstr_af3f8582-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pguxggozzwsnmemstr_f345135e-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vuhfxuopulunmemstr_a5907061-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: owhccxmelaivvnmemstr_f1b4e5f5-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ivtoxfqpvnmemstr_8bb4a4ba-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wqehyrgnjdxnmemstr_84c701f9-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: otxszubxynmemstr_d86bf787-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bygoumnzfjydjbomemstr_f4c90584-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: luvkqqaipwmpueomemstr_2b495de9-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: system.iomemstr_cf99be01-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zvnirrjyvkomvplomemstr_e5b44bc3-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fbckouotswnomemstr_b95c6cec-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cogoectvavmdjpomemstr_d0ad333d-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zgzdbibcovwsomemstr_320943bf-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zcrultcpzuwtomemstr_1902fc47-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: yhephowrihxmxomemstr_63ab6a2c-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rwsttucgjzomemstr_30f62024-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cjbgjlreioadpmemstr_cc36feb6-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wdzdmtlblfdoopmemstr_f1529b0a-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qjrsxpjyhppmemstr_91c0c556-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vfygppzpjmcqppmemstr_4c48c5d4-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fbpgrmfplwzywlhqpmemstr_0208df33-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wfdwtczpzaupmemstr_dd1b9b95-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oaweuebpwzigpmemstr_9ee1d00a-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ypjcktdazlbsxpmemstr_9f0550d2-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: foyaowuotkqmemstr_d8711fc5-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qveqyouossnfamqmemstr_e4b161ed-c
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oscdfdcvvomuqmemstr_81daf876-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mkcrcswyaqmemstr_d511f340-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kptcbbbqvobbbqmemstr_5c9758ff-f
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wxtimjjmckqmemstr_5c884aa1-0
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vwizolnthlpyulqmemstr_54fb25f2-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: jxixgaidpcsqmemstr_50ce6d16-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ugnyjnfxewqmemstr_f6dfe3bc-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rwnkkqyllxqmemstr_a6944e23-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mlxuittqphyqmemstr_5e899f2e-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lmakcnvcarcrmemstr_5ee11a17-e
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ueegnatvhkygrmemstr_88e5671e-1
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: imihpqvaksurmemstr_d6ef369f-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: srooxnwergeylhrmemstr_97881277-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tqhkmcbcinurmemstr_e1bdf0c1-2
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdizoqlbmqasmemstr_44826201-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: jeszfvjeltismemstr_06e39cb3-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: yxqjspooxdqcsmemstr_b7da864d-8
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: xuxqtdxabfksmemstr_1ad3f598-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mxkctsdzucukxksmemstr_ecf96fe7-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: icspnxoygskpsmemstr_48aa1162-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mqsmnazhhfpsmemstr_1d8ed0e0-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oylqqgnsrrsmemstr_fdcd54c1-5
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zslhianaudruwsmemstr_9b777c25-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: htvvwiggemfvizsmemstr_f5ab071b-4
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: uqgwcxypyborzsmemstr_03feaec4-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fvjmxfzronmctmemstr_1de9e8ff-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sqvxaavtrlpptmemstr_49d96241-a
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kwiocivbufyuvptmemstr_f781b4ec-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: omzurdtottmemstr_afabe1c6-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: jdxuvjtxpvicktmemstr_4762f391-7
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vfwnongrlcettmemstr_3bc10063-3
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: iponlbpikmifumemstr_2577cdf7-9
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ekvjjetaenumemstr_6edabdce-b
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: puctwjbsshkvyumemstr_80b6d4b5-6
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sqkyuhccwsyumemstr_bc4f2090-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: asahgldmuoykdvmaumemstr_32fb15ab-d
            Source: pjcvfvnncx.icm, 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: spmshwtwtjumemstr_5665f9b8-2
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053BB02 SendInput,keybd_event,8_2_0053BB02
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0053EBE5 mouse_event,8_2_0053EBE5
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c pjcvfvnncx.icm vvcrvhm.bmpJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm pjcvfvnncx.icm vvcrvhm.bmpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_005313F2 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,8_2_005313F2
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00531EF3 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,8_2_00531EF3
            Source: 1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D54000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000000.2170787318.0000000000593000.00000002.00000001.01000000.0000000A.sdmp, pjcvfvnncx.icm.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: pjcvfvnncx.icm, 00000008.00000003.2253211058.000000000187E000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251598278.0000000001872000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: pjcvfvnncx.icmBinary or memory string: Shell_TrayWnd
            Source: pjcvfvnncx.icm, 00000008.00000002.2254880056.00000000017F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If WinGetText("Program Manager") = "0" Then
            Source: vvcrvhm.bmp.0.drBinary or memory string: If WinGetText("Program Manager") = "0" Then

            Language, Device and Operating System Detection

            barindex
            Source: Yara matchFile source: Process Memory Space: pjcvfvnncx.icm PID: 2676, type: MEMORYSTR
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D86694 cpuid 0_2_00D86694
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00D7FD34
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D8454A GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_00D8454A
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0052E5F8 GetUserNameW,8_2_0052E5F8
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_0050BCF2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,8_2_0050BCF2
            Source: C:\Users\user\Desktop\1wYGO0mAN2.exeCode function: 0_2_00D703BE GetVersionExW,0_2_00D703BE
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.197c798.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.RegSvcs.exe.f00000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.3.pjcvfvnncx.icm.195b788.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: pjcvfvnncx.icm PID: 2676, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3620, type: MEMORYSTR
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251145527.00000000018D0000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251485137.00000000018DA000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251145527.00000000018D0000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251485137.00000000018DA000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
            Source: pjcvfvnncx.icm, 00000008.00000002.2255260671.00000000018DC000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2247571762.0000000001871000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251145527.00000000018D0000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2251485137.00000000018DA000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000003.2246626915.000000000186A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AVGUI.exe
            Source: RegSvcs.exe, 0000000D.00000002.4483371017.0000000005B82000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: pjcvfvnncx.icmBinary or memory string: WIN_81
            Source: pjcvfvnncx.icmBinary or memory string: WIN_XP
            Source: pjcvfvnncx.icm.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
            Source: pjcvfvnncx.icmBinary or memory string: WIN_XPe
            Source: pjcvfvnncx.icmBinary or memory string: WIN_VISTA
            Source: pjcvfvnncx.icmBinary or memory string: WIN_7
            Source: pjcvfvnncx.icmBinary or memory string: WIN_8
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00552163 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,8_2_00552163
            Source: C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmCode function: 8_2_00551B61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,8_2_00551B61
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            2
            Valid Accounts
            1
            Windows Management Instrumentation
            1
            Scripting
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol21
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            2
            Valid Accounts
            2
            Valid Accounts
            121
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            21
            Access Token Manipulation
            11
            Software Packing
            NTDS37
            System Information Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets261
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
            Scheduled Task/Job
            1
            Masquerading
            Cached Domain Credentials21
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Valid Accounts
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Virtualization/Sandbox Evasion
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron312
            Process Injection
            Network Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1582911 Sample: 1wYGO0mAN2.exe Startdate: 31/12/2024 Architecture: WINDOWS Score: 100 46 Suricata IDS alerts for network traffic 2->46 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 13 other signatures 2->52 9 1wYGO0mAN2.exe 3 38 2->9         started        process3 file4 40 C:\Users\user\AppData\...\pjcvfvnncx.icm, PE32 9->40 dropped 42 C:\Users\user\AppData\Local\Temp\...\tmsf.vbe, Unicode 9->42 dropped 68 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->68 13 wscript.exe 1 9->13         started        signatures5 process6 signatures7 70 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->70 16 cmd.exe 1 13->16         started        18 cmd.exe 1 13->18         started        21 cmd.exe 1 13->21         started        process8 signatures9 23 pjcvfvnncx.icm 2 16->23         started        26 conhost.exe 16->26         started        54 Uses ipconfig to lookup or modify the Windows network settings 18->54 28 conhost.exe 18->28         started        30 ipconfig.exe 1 18->30         started        32 conhost.exe 21->32         started        34 ipconfig.exe 1 21->34         started        process10 signatures11 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->60 62 Writes to foreign memory regions 23->62 64 Allocates memory in foreign processes 23->64 66 Injects a PE file into a foreign processes 23->66 36 RegSvcs.exe 2 23->36         started        process12 dnsIp13 44 195.26.255.81, 49737, 77 KCOM-SPNService-ProviderNetworkex-MistralGB United Kingdom 36->44 56 Protects its processes via BreakOnTermination flag 36->56 58 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 36->58 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            1wYGO0mAN2.exe68%ReversingLabsWin32.Backdoor.Asyncrat
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/J1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm, 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmp, pjcvfvnncx.icm.0.drfalse
              high
              https://www.autoitscript.com/autoit3/1wYGO0mAN2.exe, 00000000.00000003.2060928240.0000000006D62000.00000004.00000020.00020000.00000000.sdmp, pjcvfvnncx.icm.0.drfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  195.26.255.81
                  unknownUnited Kingdom
                  8897KCOM-SPNService-ProviderNetworkex-MistralGBtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1582911
                  Start date and time:2024-12-31 20:50:18 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 48s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:15
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:1wYGO0mAN2.exe
                  renamed because original name is a hash value
                  Original Sample Name:436B2F74CD97649E20CED1DC65FB0B95.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@20/31@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 98%
                  • Number of executed functions: 170
                  • Number of non-executed functions: 228
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45, 172.202.163.200
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • VT rate limit hit for: 1wYGO0mAN2.exe
                  TimeTypeDescription
                  14:51:24API Interceptor1x Sleep call for process: 1wYGO0mAN2.exe modified
                  14:52:03API Interceptor7126555x Sleep call for process: RegSvcs.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  195.26.255.81yjOJ1YK5M3.exeGet hashmaliciousAsyncRATBrowse
                    QHLQyYBiH7.exeGet hashmaliciousAsyncRATBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      KCOM-SPNService-ProviderNetworkex-MistralGByjOJ1YK5M3.exeGet hashmaliciousAsyncRATBrowse
                      • 195.26.255.81
                      u233hvgTow.exeGet hashmaliciousRedLineBrowse
                      • 212.56.41.77
                      Set-up.exeGet hashmaliciousLummaC, GO Backdoor, LummaC StealerBrowse
                      • 195.200.31.22
                      xd.x86.elfGet hashmaliciousMiraiBrowse
                      • 194.164.201.126
                      0Ty.png.exeGet hashmaliciousXmrigBrowse
                      • 194.164.234.171
                      https://a41c415c7bccad129d61b50d2032009e.aktive-senioren.biz/de/st/1?#bqcnl4tocgzq65tck3bvGet hashmaliciousUnknownBrowse
                      • 194.164.200.113
                      ub8ehJSePAfc9FYqZIT6.arm.elfGet hashmaliciousMiraiBrowse
                      • 195.26.252.19
                      ub8ehJSePAfc9FYqZIT6.sh4.elfGet hashmaliciousUnknownBrowse
                      • 195.26.252.19
                      ub8ehJSePAfc9FYqZIT6.ppc.elfGet hashmaliciousUnknownBrowse
                      • 195.26.252.19
                      ub8ehJSePAfc9FYqZIT6.m68k.elfGet hashmaliciousMiraiBrowse
                      • 195.26.252.19
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icmyjOJ1YK5M3.exeGet hashmaliciousAsyncRATBrowse
                        Rage.exeGet hashmaliciousUnknownBrowse
                          Rage.exeGet hashmaliciousUnknownBrowse
                            copia111224mp.htaGet hashmaliciousUnknownBrowse
                              FX6KTgnipP.exeGet hashmaliciousFormBookBrowse
                                uhbrQkYNzx.exeGet hashmaliciousFormBookBrowse
                                  qPLzfnxGbj.exeGet hashmaliciousFormBookBrowse
                                    ngPebbPhbp.exeGet hashmaliciousRHADAMANTHYSBrowse
                                      FS04dlvJrq.exeGet hashmaliciousFormBookBrowse
                                        M1Y6kc9FpE.exeGet hashmaliciousFormBookBrowse
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):526
                                          Entropy (8bit):5.609142618915075
                                          Encrypted:false
                                          SSDEEP:12:FnvqWua7mmUsdWCGR2aWVRW5wp3WdMcY2T3CRqvYQkQPv:3uaamoCY245C+5lCRZQkyv
                                          MD5:8E9FDFCD200596BB3D295D701EFDD295
                                          SHA1:EF7164E10C9D68569CC6F9719523DAA77144FA6B
                                          SHA-256:18F2D0D2EC83B3F4F811AC5399AF7530470E140500735CF2B7D4CC84C2242918
                                          SHA-512:9E6D8FB63D0554916A6E1BDDAAD4FCE54386DA167230A0CD0FDDC8F106538946873D5C911AEFE6B35585B489C38672D282AD0422F8181F30B81C002E2B2EA4D9
                                          Malicious:false
                                          Preview:7GF07n094t1cSI05M5244s2M2b2368S68o5S5576OQ16M61U25l483395P7P86Lvcr6DR9c12M5rq7U07054713JBxM4Ii7e22T995UhJ3bH360IkGZokkeO8st56as43u1678O599iup0BF3809H703f3zy..StructureConstants ToolbarConstants..4mtgP8337yV9r25Fn7Y0AcbL369wY5ND86nI6nG7DU39L6121H67JYS9b32a0I52l9mxx06pX4E3Vq01w5ncD2..DateTimeConstants GuiDateTimePicker..J32f3T97Y93yV5aL5Ni18134Bj7Z747fbBHg404ZvxSIBSLLq6D4e12819KEyJa8rs884j7Jz4Nswx..ButtonConstants FontConstants..x0l1JCwXLX6I30863T7wmx0ew5Fh0wz3D353V191CrD6X1dQ95444AW11Yj..ComboConstants GuiDateTimePicker..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):557
                                          Entropy (8bit):5.542606760251132
                                          Encrypted:false
                                          SSDEEP:12:qTs/9CZVjYDT9oCBT2BTlh6dxfyttXAmc2UqX0R782VWd:qTs/96G2TlUwXAmHLd
                                          MD5:E4D68B658FA34C6DC2E0025519E6BDB3
                                          SHA1:22A275FDEC8334221A86BF000ED31D1C3FDDE641
                                          SHA-256:FCF5CBD820A3587FAF54F0D6C0B7E264195D24C401C64B3E4BFCF4E28A8DD1F7
                                          SHA-512:F0F4308AF4F7D924CAA37E4C77510D5AA6765FAF0AA6503A7E222539E471DF7E76E6B12003F1F6E2551A6A79E7F6FE607556F76756465651CF052DF12F8D9DAF
                                          Malicious:false
                                          Preview:7e0804B7v3w..StructureConstants DateTimeConstants..2UJ34YD13McvS36RW60i9n0iwhdw7Q1sg58iq721Uhw0R588uh4P4L47SW94Z00CFUPfJPmC4Pdd705R5Q01vqkUQ43W..ComboConstants FileConstants..N9rH3cUWT1My47716M88J8A870DxC8Au6Z3jV6207zrx8412g61v47Wi229J53vg438o7pB2362964XI48477zl08Th70P50g7Yk36S0z8i3Kd4pC1r5UJ2jeAH8U4tT6347cjp0q65408F78T905b24gwn2953G9T970Vqq1W235EM4..DateTimeConstants ToolbarConstants..4Wu7YrT0145THO5c1JjF478ADn5dv8029n5675i52622u40c1qg09EK77k487vCzHM7..ColorConstants ComboConstants..YG8BdaqLR4E0c1d008v04c1K6BAV5539X6..ComboConstants ButtonConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):578
                                          Entropy (8bit):5.584668338629392
                                          Encrypted:false
                                          SSDEEP:12:mZ7obtcCRLP4HWsdk/VE4wlsx88LhwmSB07DEAeGt:mdkuWq+Vzwlsx88umSB0MvU
                                          MD5:04A32611FE3C56284FDA4F045E41D263
                                          SHA1:41E0B5B4E4C2E27721F5C2E14CE2430452145CB2
                                          SHA-256:3C635A9AAD0066916D7CBB8D2AA46751DE5482D07D3DE93006EE507A8D961011
                                          SHA-512:C2EFD0F2FB937ED2FB85677104039FFE56C595BE865E4238E277C11AD945B25D66D4E3810336AF02C98B0CF0DE0E5499A273CABDB47B08F0835D9A93F13BBD84
                                          Malicious:false
                                          Preview:8i85atZ9IQ6Xz66cm0Itk7Z79T6UULe..UpDownConstants ToolbarConstants..ak9154t0i61266IN4CpOZ68h1909p39r9U3rHr9SpOWkTMcT3UE6MQ4cBQEQrqel63G29a32kc1g60q93641..TreeViewConstants ColorConstants..6x544mXzgUFQ4h47Gy11Ya453xJ3051xCvb50760j9d17nF95GSJ8QX4KS92qX85HbQ4546D18j05Vg6DE4g0ZR9zu7eeTIF5UX49152X21S57V7O90..ToolbarConstants FileConstants..z82DFn5v73IJ2MkP3626UxL9YzrK1l0IpvMkGB819U74Zo9u61n1n0JQr052v4w68vcQu4rtGf0PJXY22Cc4661K21j67EGlre34f94YN4f9k4o6zlUQzqaN1g1GP8..ButtonConstants UpDownConstants..p42019Qn4bW286fHW97tm9k7V20tC19I9956Djd07Ihk4..DateTimeConstants ColorConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):506
                                          Entropy (8bit):5.615861878026584
                                          Encrypted:false
                                          SSDEEP:12:xBjCqxY+RpcDa5/fsWBPbfCHUMwPcyboxVQ:xsqOYt5sWsHUhD8TQ
                                          MD5:45874CF12784A8793E2979D9B8A86B6D
                                          SHA1:425B57FB8562C334CE5A9A472FA8878F9D153EBB
                                          SHA-256:7AF18DC05BF950987AE7BA4A72E6C276B9CBB8DFC822E44AA3C47BC1AD900D82
                                          SHA-512:2CAD309F9589C52427BD26C920F8EC58AC3D6C54D9210591E9CF8D3A98BD993E35D3B38F6BA56BB39068EB372732561069D54BDA1EF12944DDBBE71D5AEA9AED
                                          Malicious:false
                                          Preview:M90z8sKod5L6yd7ohw..StructureConstants GuiDateTimePicker..Y376Mg9Eck7256bR943219I0rb1CL5I9ak29M6d68p94xN931Nf2FL5Q4Yi6kH856th37rlfrmOsQ51Oo75552tA50Wy93xmBrcC10Q486WR5Ief6sEb3S76Q64XIh1j1a9849233D1962736I586w0D73WCl04wA220y2410..ColorConstants TreeViewConstants..55NB9q9103Y3aL51AlH6l3bk58rhbh4qLSR098j8pswb3a4Ibl3KS3l734FDxF6DKg34567Ao473bO6246Z6lQ9dK0sHPY9kHMbWK8WxOqDzBsGlO879jfx5729RMb9154jp80Y7V6654729LqH8E1u..BorderConstants FontConstants..H03fq0k1x20sQwWn4WVx0AWV..FileConstants DateTimeConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):575
                                          Entropy (8bit):5.608505888809514
                                          Encrypted:false
                                          SSDEEP:12:MNjr+6EZu8s8tOUqWKnTCCxHCNSIQFE1UEWwS1ox5zHc:0hCu8R8NWKuCxHXvE1Utbo3zHc
                                          MD5:DA5901B29765E106CD5B9748E05243B3
                                          SHA1:8DDEEDF2D2825B961C9D9529E594DA1ACB1F43B3
                                          SHA-256:BBB44E2E85E463D1ACA8FA3E51E50777E2DA5C5B979B9D42385276B05CFF7277
                                          SHA-512:5EB247764D0A9173982DC7993840B299BFA9E86A806D62D4390F13DAEDFE9FD03BAF96EC7BF54394BB276A443EDB9A047FF8E7BB830E84374A5167079D1918A0
                                          Malicious:false
                                          Preview:338307SKn99A2acg06Df1AVyvs69DaO87Wb038di8gR0zA2T028F3k8pC0w38gO9jn3F8xrz8699WH20l9c65D1GefM0KFn73g1885cfI6qQYyQnHyjKd522004Dj03g5Uv81d5Vh6HWnB5qdn1V8QHr909g..DateTimeConstants ComboConstants..ZRX8l76G0EG4102czR47Pz5K3x6064Z3qkPA6..ToolTipConstants DateTimeConstants..6Gx4i980X4oU18y6xM70Pal730t4hsqcNF22VF91I690716E1xq4A45707H0uo4Dq97j63o75045kuyjU9rcy768D6S5k1731Py4444592i548x2HWiJ2V54p9K2Y54ue50a70Uqf5Zm0g3B62xMHe41n619bexxQjiq..FontConstants BorderConstants..Y2w74Z96W1C1A1hd4zpjP3s94Y77P978Z47VG5s0P842ZiZ59uSy56a5417rvSx00091525..GuiDateTimePicker StructureConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):629
                                          Entropy (8bit):5.525187843934755
                                          Encrypted:false
                                          SSDEEP:12:XZ02XUStGAAFPYJcFi2t5ZTRIdWZfChXbaJfl1GUd4dd50lmR:XZ0oklycFi2tTRIdqfChXb8tUHxjR
                                          MD5:B857415BE9FF6FAD8304D42DB5A7D759
                                          SHA1:7A382BD4CFA12606DCFF1559A94048A974D864A7
                                          SHA-256:999AE452F380331CE38B998A25847F26A369545D2732FEF912A0C62812BBA471
                                          SHA-512:5C3F9CC08F7B3C77FCB96EE3E13FAA21E865359348D436AD00E853D90B833DE1FF3F9DDCD3C090CC15388756695AD8FAC1E8CF957FB782710957D81827FDD014
                                          Malicious:false
                                          Preview:U6YsjLQRR960uwm6LBaR75113..ColorConstants ToolbarConstants..D8rb4..DateTimeConstants ButtonConstants..i9gzDzj347j1GT4N6699h..TreeViewConstants FileConstants..476b69UY03325MaOk696848px3LX32456pu35bH7K128iBYJNR5F183UZo4qk4xhpa604a043UT3283aU78B280P3092Gm5BT6Z910h3K332P9P2I9D7..DateTimeConstants FontConstants..20Wt6i4813r7BrqpU6W9MOMc91ZL759gEdTdDRw27Jh57w02ZlkH453u16sF828S1..GuiDateTimePicker FileConstants..uOn8s05442H402x21pH18A0Ggd951lM1jrDk5J0Fz4..UpDownConstants ToolbarConstants..A67Y2d0GC91210M67231hZp2gmv57gzC6u41a2HDFDai5c4LxFAh30Sw1D1h7Mq0Ur8dE7S4858w8S2ND613l7894p4z9l7j021O4U906S1N..FontConstants ToolbarConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):515
                                          Entropy (8bit):5.491608079508514
                                          Encrypted:false
                                          SSDEEP:12:pHOtTqxcYuUyPEW4yPUwqlOe21CmCBjQb3fkEC8J:A4xZwqFtOe20mCBjskENJ
                                          MD5:0F8E3A1042FEC224A546C2702470D050
                                          SHA1:BB9C92F2F65CD91111A6390A78FB765940005CB9
                                          SHA-256:66AD0D0E52690B96AA9CCF0AAB396BC64564E9A08A667DC971F2B348F9859289
                                          SHA-512:4879562FBFF873E9A915DF692F967A5B87D77D20236121180407F970D4DCC5727098194DA62004804B5D6993C59FAF0B2471F5FBEEDA818CB2B80ED99F6DE4DC
                                          Malicious:false
                                          Preview:915N39tWa8NH8SVp4Xpx0ZTD3U7L75911829IdU44BXY0ZNTCLnx6o03J4610Ol205l034DlW6x22Vi68..BorderConstants FileConstants..ujdOz74y3w2627t8P113WI7D982c146UY39oI0v3cX02W..BorderConstants ButtonConstants..wn25342Ia78B7e6849958EHYb9bq8T2q4C9..TreeViewConstants FontConstants..3u7967RtL4Q258T3E6259H89makt3N3T1J7b74MA515CY..StructureConstants FileConstants..0GYY2C1p706AXhY748S5u02t9xxV683114nt5y91zY3f24nP6tYop8954tqO2tf4w1Zce4rT70f3A2k75989uy66Q8tCT0h60OqdB306KU8O7eK8AF43zBA079Pd8O5M26DvS32..ToolbarConstants ColorConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):587
                                          Entropy (8bit):5.49701055125167
                                          Encrypted:false
                                          SSDEEP:12:MCntEEBGsv0IL7xR6VrGDZsKORwvvURXTUFXpLW+Im:MncG27xR61GDZ1gauWLW3m
                                          MD5:74D5043B48EA06428CEDAD8BD21013E4
                                          SHA1:5536E1F5D3803B6FD5A6C34EEBB97AB6EA0759D9
                                          SHA-256:F8018A3028E99A01BA4A9F285AF951F964EE80F73E287F267D9326FAE73AA26C
                                          SHA-512:F010C98568A135909307BDA3350BCF91EE8158F1C258F36991C61D30F57CFC231EC84011FA618C773B0C9EA56700195B7678B52FDBB37B39E9E536409B8FFB4D
                                          Malicious:false
                                          Preview:q0D7N659963W57H5NiLF0s5o3dH2oc9UPn707z4N2iW7518m7i6d1x8..FontConstants ColorConstants..UPE14r4bRQ..ToolbarConstants UpDownConstants..4t94py69I1J76NMUA0PVQ661E06H4wXUdfehuW4K2vX8v72tM208I1V4vv415CLh4wy7zw29Vk7eVq084894Y..ToolbarConstants ToolbarConstants..e62X3H8S4..ButtonConstants FontConstants..gBfwk80m43H1NH82tKBst79z8I8d9B6YR762V29E8L25Z8F96514c39H8LPN76hPnn71511HYmf2G3279a..ToolbarConstants StructureConstants..y8696pYVC2QXr9A00713Pn05f9Y56JH8g05a7l4cP6Q68w5ui3bi3f1hDs324eQI8U2I3E77mbJ5UK1S57E61da3b64vIPdp3bq39C15Bgo896zf3508r7ma0h2s6n14H58..StructureConstants UpDownConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):552
                                          Entropy (8bit):5.522366636609422
                                          Encrypted:false
                                          SSDEEP:12:9YVgKmEOYs5v2SMc+FeCChTzIeRwV25hCmQ54yYeKboYz:2R1PKv2SMc+c1hnlw25hiyFz
                                          MD5:88925FD91096E99B74876ACEC3E38CAC
                                          SHA1:F63839632CE4D1803DEF64F30369DC195A13FC64
                                          SHA-256:D129F2CBDB4712A8DEFD5365979FFCD4F782A78BFB774CF262D153B7701A7C50
                                          SHA-512:BD141B4131EB06C4BDD141823F0C4C479485ABCCFE5DDC2B0EAB01AD6F61E43AED34B1CA2922F7FD915560558ED03D6098422389591865B7D4F2D3E21CF5E757
                                          Malicious:false
                                          Preview:52P90t3187Bo0gYJ55vqG98e8531b6029474iy68..UpDownConstants DateTimeConstants..8n127g16aOCX2y61932V30D442k8NE20toU641LK0..StructureConstants FileConstants..M84j6AR990c78f6484D6PcXD6NVd1i4u6P59TX204l48886Dk5WG69633378Ji7gX2T598d205mlb79bS277977901w61NB0FT8IdT4d6PM4U847t0A9yx4r6LB999GHF96r72W3r56rP3sWd1965090k18E267J514M08N..UpDownConstants BorderConstants..RR5F5p75s93Z80Lhjd9881LZr52YRF1244380w19vuGH151ma5NF552Am..ToolTipConstants GuiDateTimePicker..47wa1ysf3bF2iSf8aLV2HQTD9JVn5x05461035O4e0VS503aY25g0787pnJSXXRKD1..BorderConstants ButtonConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):626
                                          Entropy (8bit):5.499303384306603
                                          Encrypted:false
                                          SSDEEP:12:qycnOs9jF6DgBlqnQfXHUTObFd/dUrdP2hBdsnoQb3:pcnOejI8DgKX0qbFdltzdsnD
                                          MD5:4B2C8E743EB4EDB1A928824E0F567C35
                                          SHA1:A89FE685B5D35FD7EF9DD4956C27A8C6C3BAE525
                                          SHA-256:5A1C32F4D7BE737E000A6E77248B4C1651E0100CB21F88CC04DDEC5124F7C54A
                                          SHA-512:57C6DAE4E991B48C8FD49F0DBE200BAA3054DCF912D8A314FF0DC9927F0263E5E70871F7D27A81BD49F7C8699657188996616BDFBA24AEAB4D62C699961BBF33
                                          Malicious:false
                                          Preview:JbBw3vG6jh3RBW1112oB73Kg0gr3132619Bi..ButtonConstants FontConstants..q00OPC226r643G7H93raC4G246507pc460TY70t36u369q5k1z9h2986V6c0H468PtB3f3220I05p1jwx5K7q11973893jPt64nx..GuiDateTimePicker BorderConstants..vbJ0bGQu2H4MK0B6etJe89t5f745iccDgW6w6dm5P7wA55180An96s5OjI515D949tRU730VmHrNph2Zu2N917y1P33aO693298ChsN68C97yDpU452f90649440ryUN8b7zk86T9qe76C622780NOfcu4Yn9261hdsrz4e269B14H92..ComboConstants BorderConstants..4uX4580oig35oU08lb0139826Te6XkWVs259iOSL107Z4..TreeViewConstants ToolbarConstants..WZ11T8389668w052706a222v16415007B5J61722806z3L5390o725MqjENe86ikwn1T3LJNCU3xbHGR8o5813QC930gs3..FileConstants ButtonConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):651
                                          Entropy (8bit):5.621784547740191
                                          Encrypted:false
                                          SSDEEP:12:FQlcHBmVtuF+BM5gp1E+HvASYHMn/eqsT0cu0RQIZALOBPc:v2iYM5S1E+HvmX4cu0RnO
                                          MD5:32CE892FB2F1EA83C96718E8A1B484D7
                                          SHA1:3DD4C084A09D1A218C11812E42131D3250111780
                                          SHA-256:92A7756A056C061EF2419C40568511ADA4E78E5081AAE5B77CFD119B7D257D48
                                          SHA-512:CCAF4DD1441D1FCCC73804F5335C494261A3717CF4DBB678C25AFC6EFC0D68EFEEF04BDD6F5A356D42489A9E0CD881CB2A014F76090747CD688E4C00FBAE4879
                                          Malicious:false
                                          Preview:96C4r30AX3rjlo4x56k2M165K7WcV109Bv3KD94E380x71434n98T8869856dNpqT2LR4805kU7a3g95703W93j7ZwO410D9ym7Tl367p665Fv6996EfIBa0Ox4T3NO5805hJ93298c4kk670129877..UpDownConstants FontConstants..g7Z1y9BwZ4O2vLB4JC079n8Xy0ah5Vo..ToolTipConstants ComboConstants..P5YCy5N..DateTimeConstants GuiDateTimePicker..8syf2n4QyGtrJf219c9k18y8oF292lb2Z14EW5w4i15Ur1phTLAA83buTS3Q5p1u5u132F2GvJY26Kij9Q3R83k6U090HyaPM5652j1y7mbq50AG32g8Z96Z320fn148QQ0ea497j..ButtonConstants FileConstants..6FA3cLlIfRXi0QQ16988617W04uPOn22uj8d6VUN8i285pv01P2MTejP3Px380519r0X9dd8D35D6rt5lQIH4K1LGq4T24hqC53tsv0H3Wk065531KQJ050P48m1Ej7bZx8JZiwv7oio012225..DateTimeConstants TreeViewConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):544
                                          Entropy (8bit):5.509601786657226
                                          Encrypted:false
                                          SSDEEP:12:SbYBdxG7BjRHtPk9uRUrYBDbRtRZQ7PU5FJQZwt:fxG7B1i9AUMtbN1
                                          MD5:9B574D3C62F846CA895E782B7F71CF24
                                          SHA1:0DB4BB352E1BEB8EA05FFA22AAFB2FCC857497CE
                                          SHA-256:4C65429BBBFF42BCC1242D7DFE78A2D08F61854AC227D40FCB2559546A8D86D2
                                          SHA-512:A939759C4ED07B566C4756DD9F9F85AFD385A297B037B6A739D9BF7D17451C807B4432940E30614B59384B3808BB70D981C32FD146F5AE6B473309269B6881E2
                                          Malicious:false
                                          Preview:9G9G6g3Y4u44dIp323372Rt3B7c4N4093638Q882f95uJ0Q12pm5E3G3VW6c8nq81..ToolbarConstants DateTimeConstants..yi5s44UC2nX5K58i7716j726Lj51uejSEk6l9T5dtO97P543B5AJ20Lc3JzRc6xM43NhwB8B33BUGUA29X8d5ZZLC2..TreeViewConstants FileConstants..q8Icp0J6MMc..FileConstants StructureConstants..6n349C60g7e36MZjUgCdN74m38C4570KBa8y8b64DR9S19600r806AKm2bM2iaUJV026X7Ozg068..UpDownConstants StructureConstants..MG91QR42u4R22Q0iB5C6586QL04nQ895329k8quK852LdM..TreeViewConstants FontConstants..v3SNpf0b38UBKGIiJ80p8V591722U852r9C6oK..DateTimeConstants ColorConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):618
                                          Entropy (8bit):5.547313237238842
                                          Encrypted:false
                                          SSDEEP:12:DwrR3TUar56HjuPIj6PFhgwnauV5VPbdEk2dOIk1pAWHWJciyPrBPc:DaRAa96Duwj2gwRbPbdEkTpzHWJnCO
                                          MD5:545D7D102C3A48B2639E7F2382296EA8
                                          SHA1:1215C32DFDE84B5ABDAC8793471A748F4DDFFF72
                                          SHA-256:0FB463E42A35E65104E50416245E81530EDAA5BDE5D155D461D2684FC0DBF304
                                          SHA-512:7DC15A6A24594C179644A5D1C3E5926A2DDA8E439CEC79F725FF437FC58AE5E29745C3B0D499EE2ACB012C03380953E2892D17C6D7FE5F45651F74CEB709AB5B
                                          Malicious:false
                                          Preview:VIl95mBo3vT9Wi7L307V0N62t33..StructureConstants DateTimeConstants..1e6zIf19YA747v1761B2M2N67Y..ComboConstants GuiDateTimePicker..1eTVz929QlHOR91r206sO88037I0Xr44p1139wuc6U434Uekfm4eK44m8yx5685M3rU0S73L0tANO51xNZq38192r5wc602665g83nMKcu14h1qOKKK496L56ID4R4M291z94..FileConstants BorderConstants..k65yQIQ91936rUQE91940785W3IOxh38R7OH23KQ845i4795X6D5H7847e04jo45Rp7HLi6z0gz3M62551eO6NZ0DRD11m815584Z11m71n261jB784N4W6Kt8n8k..ButtonConstants FontConstants..5N8X16Cu9GTj93ih5xw44718HoD67N7SUBMqk680I5Kp1fRu7J9Y5889z9z6993O0CwjkM32955SkLnQlN47pr1l569D2uoQIl12H937x77zI7B4072m2X2t84947Y..TreeViewConstants TreeViewConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):523
                                          Entropy (8bit):5.452504389304269
                                          Encrypted:false
                                          SSDEEP:6:FGjLW9cWiB08fJVCf0ZeAAFScrBScJTmfKcGdv88dxDxUb0ho/i/jMicWc:MqRiBkfqelFPrBPJOKcGt/x9UAhfnRc
                                          MD5:1163AEBC09E46839263D5D70C7ACB973
                                          SHA1:4BA9EB857C9C96C02CD9A3366FB7382D0A45A471
                                          SHA-256:D5A4882ADF7CAA297D610399AD2A115A5AD66D5F8A499BA4E5A02B303E33876B
                                          SHA-512:8C14D08F32DF73F5C6775D33574105CB6EA659DA94202F8E6527899835BE8CB49A9F2EEB01122671A9AE8A667C4ED76884A23CB7782D90C6AFE0C545ECCFA35C
                                          Malicious:false
                                          Preview:GN67397p7Ad5X5DmAQwDdZ9G..DateTimeConstants StructureConstants..47W7TDG48q7qt92z037LfpnN55Rgy1g65g8dz38035DK10aS7bZ13EV144p0oj3C7nw8m8G59eO1962qrm358673P322b8d8..TreeViewConstants TreeViewConstants..39so76v0w77c6Q1730JlB59e01233zf576aA0J1Tp92W8003wqcMj57f37467254Z0n575u9567z4..ComboConstants ColorConstants..50GoDFi11vXdJ3WUy52i..GuiDateTimePicker FontConstants..r3c1ut5Oa34Hx74Tzyb8GzGFjZ37ROW055N1dlm137HR117772f94f9juQ5725232Cq5..FileConstants ComboConstants..f7N71443KFNrV727Z7niM..UpDownConstants StructureConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):547
                                          Entropy (8bit):5.486033748710765
                                          Encrypted:false
                                          SSDEEP:12:w/lzY1pPrBPMC2GqBkh7ahZPTs3AQdJATi:w/ZY1xinGqGahRsQ9e
                                          MD5:1447DA15BE20BE9CC07192F34C097409
                                          SHA1:01A42794AC31CD029FAA411AF7216FDBE57FEA0C
                                          SHA-256:56DB027F9858785542E92B97B443BB98023C1D06275901C5A19AEF22CAA9E45E
                                          SHA-512:B462D108D5C324D9866445ED9225985C0900B1CDBAE2E9C836E46C1A64D8A0C7F157EFB3244EF825307FF861054169D5DE1B65DF61B581637AFC4EF8AD4D36FE
                                          Malicious:false
                                          Preview:Yk5310Ukh3m1Grd12k05kL82H0r7243lA8479T42e8MR9637IV48HoV2WH713X77SPM4iQ017a07S796zx2iteGeunD37..TreeViewConstants TreeViewConstants..4rZ368s9042Cqw6U1QTClSY0gg497z6bo57pa47I2nY7i5GDfUao668ncHx4XX126FE757Yc02i2Uz3C4650m5fd17xL419A1u3wzO0ak916KC8V5V291FbxEI6axA5t8U139JX47..ToolTipConstants ColorConstants..sC3K0d4678Y2w32L074O2..GuiDateTimePicker ToolbarConstants..77a648d9961W9..FontConstants DateTimeConstants..tT501Q5e227r34df47H880XV17078a34167AC9084mUnp1y807S0X5x4fG990guL0sTdHRP4IU691w98wT3DYduJ23PTf8O30nq2860..FileConstants ButtonConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):40122
                                          Entropy (8bit):5.586289114180869
                                          Encrypted:false
                                          SSDEEP:768:+a5+CrAuUltyq79tPI2arB33kindEDL0qldyf/K6uVEalzDUDGdwCblu:VPgFXaN33Hnnqlgf/K6JalzDyGeE0
                                          MD5:14EF93269646D40310CEEA92AE9339B4
                                          SHA1:B61363E6DB7307ACBFE6BBF8230F754F5EEE6C88
                                          SHA-256:40DBC8112E05344401EA3F49652E14C23AB129C39678BF508AE99B7EA4226A73
                                          SHA-512:DCC9E187E565184DD12C22EB292911A8CBEE6F65CC4F3B66355578F68CFA8CB723843E8B21B3CF6B12A998ACD7062A47927CF57B33A12AF5BFDFB056A6FF6335
                                          Malicious:false
                                          Preview:t0368B84..Vce8E3G112484uqVcg739213a83NGC7loaFmqrw705mwl8EM31HE435V50..I7S9UHO9M64y8Rgw3gP2gbg83tk..Ps402O18z99x8FM93Sjb3R551wFnE1sQ5diL2ztGrO4H36c02961sj0x1K486A3ec05..m2Ro6X3GSn58yfnhPNSloL66t76R1J0Su..0tW711y459I05E41G233A2d00801JQYlVx20m0TkW5qjv612n4s2B4UF8416qQ18uY742XXS9Gl7X28d11kQ..qIk15mXv018kI8awrzT80D263eQ1cEqyI3y7x509BT60hpZ3Qx12Y4h1o..62YjSV2k9329A6g538J651f341C428bD989m5b58A2sTUSB1Eop3XoGW8uyuCH3i83lJ..2Km158j4d3S01s15G5UPJ7sb4033kl5f6z2ozVM1Fos2CyWt600TlsT6zcFK8I3u8SzMEsa..8W96K195j3y95rv5d983V29O965N249MLdeSC4r3UG08I60yxl6EHsV6S04Z9vBy2e4j..8u7750F4w6q68972sE2KyF3305U2S4M0p3nof520o4784lR8QDf97I1Y3..4EF3T5O8m6647HO568K88x5JRVS4dnRGc6s22xKJ6ixY5210N7..2a316j89ZEV3q0oc5jg944kW..D693D61469E0pF6x7BN1c082P1NSVS99j95K1C395g34D9JsZduq94H5u..8X343a15583N99kU791EKS8K3B5ob7YFDDuo7863a21jyO1K555x5324u0B8h6SBG8MDVx3lY..768CEP0I6o9oJ5R858wEYQ7I1giD295PU4N7Nd1mtvP114LEM12QN0948Iwc1y0N0..Lc2nau9Fjh84gd53YF0144o2S5IW..mq1oatz08eUxW161Pid4p02Ntw23OK3339KeIRQL4wcpr5HAm5x5OO8v3z00nQy0o024v55
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):947288
                                          Entropy (8bit):6.629681466265794
                                          Encrypted:false
                                          SSDEEP:24576:fYgAon+KfqNbXD2XJ2PH1ddATgs/u2kaCB+l:f37+KSbq5e1diEnHaCK
                                          MD5:0ADB9B817F1DF7807576C2D7068DD931
                                          SHA1:4A1B94A9A5113106F40CD8EA724703734D15F118
                                          SHA-256:98E4F904F7DE1644E519D09371B8AFCBBF40FF3BD56D76CE4DF48479A4AB884B
                                          SHA-512:883AA88F2DBA4214BB534FBDAF69712127357A3D0F5666667525DB3C1FA351598F067068DFC9E7C7A45FED4248D7DCA729BA4F75764341E47048429F9CA8846A
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: yjOJ1YK5M3.exe, Detection: malicious, Browse
                                          • Filename: Rage.exe, Detection: malicious, Browse
                                          • Filename: Rage.exe, Detection: malicious, Browse
                                          • Filename: copia111224mp.hta, Detection: malicious, Browse
                                          • Filename: FX6KTgnipP.exe, Detection: malicious, Browse
                                          • Filename: uhbrQkYNzx.exe, Detection: malicious, Browse
                                          • Filename: qPLzfnxGbj.exe, Detection: malicious, Browse
                                          • Filename: ngPebbPhbp.exe, Detection: malicious, Browse
                                          • Filename: FS04dlvJrq.exe, Detection: malicious, Browse
                                          • Filename: M1Y6kc9FpE.exe, Detection: malicious, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L...).(c.........."...............................@..................................L....@...@.......@.........................|....P..P............N..X&...0..Pv...........................C..........@............................................text...|........................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...P....P......................@..@.reloc..Pv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):548
                                          Entropy (8bit):5.623829319850138
                                          Encrypted:false
                                          SSDEEP:12:LTbwonrjDdcjC1g/hRqr0mtqmXOzI2QLZ6GYxbmgjJmsvLs+qdt:37rjZf1yHq5OQLgm2Lwf
                                          MD5:FF7046CC1288C5C9C596943A198A2D79
                                          SHA1:88933FBDC773B8C8FA3DD620F2C4088460B4DE12
                                          SHA-256:10EA86B4E0DFE44326A6F99BA428CEC3F3F370BF56C881AAE8DBC3394399B908
                                          SHA-512:2215279A25EE80E0260BD9D8EF5C770A7CF389EDE1C9F86FC1D3466580C9EC59EBB73FCCB01DDA6FC1853DF6105911F8CF362B3EDB5E8A0DFFDF829D19409E21
                                          Malicious:false
                                          Preview:73tG96yTwO6wd1t6ozuOAt989C1ZR5yL7878S1jTT7PW3V43k6leP6Q7N10c6xh45uwF6Vg35Uj2r1t33S466m3Y7ZAv7N9F0M0hKD8ZQC530P4S9A07tJNC6KC7088u135jPk8047B009003857458EL65..FontConstants ToolTipConstants..hJEB5E67QyE435u2I3Hw89yJH87q0WzXBM8R2FrEIC3zR58392O26voi034u96ZJ772ZBA05UdX4q8530Gd07OH07Jj432FS1w7GHB03b1gm9b8J9h4eZ6726T4siN5r77n90j61O4CH38mpK0LXahdUj3Q21899W8j9..StructureConstants FileConstants..251E8U738ibd30528T7e9074l702r0iy12ev84..ButtonConstants GuiDateTimePicker..5I8r1u1U9Jtq70RL9UfMXVmwR9q5w5ut7AF391w0CVrKOFjlZ0..UpDownConstants ColorConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):564
                                          Entropy (8bit):5.567320651056784
                                          Encrypted:false
                                          SSDEEP:12:7f9TdR2iDPyUa43H9VMPX435GSuPJnDvWhkIRooUtBc:7VTd1DPbawH4KYtDa1g2
                                          MD5:A5B69010476DFA974972B47D115F6103
                                          SHA1:022E3C9575BCB309FDDE210388EB6EC38DECDBA4
                                          SHA-256:22FAACE097E012A3D7CE5FD3D79D38569B080C13D20B1218324641A59FC5E962
                                          SHA-512:CCF370434891BA7378425CC3071FB6C9F079CDF93E9FCFC1227BFF6AAC77DFB6053959793E4D2D82163A397DFF07161101A27041A951F0391E4CA05A3ADD288D
                                          Malicious:false
                                          Preview:w9455CC7dU5v2yBqsyA4w08k6Wfi3W191z4iM5D3YY7zm946HcHEfN99977J9780rxqS18766V..ColorConstants UpDownConstants..b3660B0a7684292e2cl5t31NtoAl0x86z9B900629rv7WL85aT4821692g4Z2h6m82s33xe6s8lR65zP666x9Q2p528yRx45DZ1WNO..BorderConstants GuiDateTimePicker..q8J654Gcc7cL5s85tY65029tUlTGJtvhNnTER6q090317a79v42Z558R403E7Qh2Dy4Z34c73Z25c72AK015r166BPl5rq9O98y7A11Z99wp3IunF884Q1098DsG4qCq73c86G0QX5040XkNc33626D631uF..ButtonConstants StructureConstants..X2qVXKtg2245CP322u6G41u7723M82521fIY2293M1J67tTm7x5kpG9I8W647b5ffn4Ks8GYrP4rP86gJS78q6ilZw6..FileConstants ComboConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):506
                                          Entropy (8bit):5.536492221883502
                                          Encrypted:false
                                          SSDEEP:12:jd/VOBP5kqndwrIObbnHSIGhXOJafnV6sHFB2z:K/k8dwrBqIeXIat6sHFB2z
                                          MD5:435357F3B985DFA8D2D9302AE6361AD1
                                          SHA1:8545B25B12A5CC490272C3ECE513699B9A69736D
                                          SHA-256:734802EBCB6A6BD61496F0EA70F5F5A78FBF754B0DCDAD810518D1C7FA9E680C
                                          SHA-512:33B9F92EEC9F885F96737D20ECE427D67C0C3045EAB2CE51B2C914AB16E5DD527BA4D791051EEF5F76F7D1A8D864BEBEA3BE423CD11BF4117E1EC3DE8A62AC15
                                          Malicious:false
                                          Preview:wm2Mh36mf63844B9CW786jh9i3in22Y47HqoZq4y19rZc118C..DateTimeConstants TreeViewConstants..N04Nu3RQ9VzWhP1BYe5dX8TLKH86628880AOX9ugJ2Aufo9CeT31gj7Y7F46rRV9021I321b4h997R39e5SW8iX425QBJ7M4oh8SqO..StructureConstants BorderConstants..4800l74opU654rbO5rAPu361xV95v40F10rPpF6s39miY44u4733654398B0w89L075472d534g9o992ISP24UP0UH0V7LlX023Gi79828ecq278V4A32k85iw2iHX88q5X649224d6Z36XnF6K7Avbenaz2C6JWSqq930Zbjo2TPf06n3P..ButtonConstants ComboConstants..4qO8rBl530oi6oOwY015Q22b383f4..ButtonConstants ToolTipConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):519
                                          Entropy (8bit):5.549190611316752
                                          Encrypted:false
                                          SSDEEP:12:TXE/lMcPzRutZ2R2LE6Q7jHa0L7PaQ5u7:TSlHg9EnHaGk7
                                          MD5:10EF9BC0A83922B680BDC2637F740900
                                          SHA1:54CB6519AA57AB0B1E849966BA68FDA5DE0D801D
                                          SHA-256:81382E9D6B5952A3FBD52163964187874A101AE2735E1A87B253D5B535A87642
                                          SHA-512:1735E55C0AB5700F47B8F1EB8AE8A3402E6AE18F45691E073D782B0CE54AA2F4460A4955A805B718DDA34A7138A3FE22A5CA80DAE3DEE1C45A92C8D321EC9579
                                          Malicious:false
                                          Preview:9nl5u9nKD846kf21238oQWQ5m58Pk9wb6K05Y95OsOYY5A3w15313h2i799YXf7CzKG5o4MiW7iZ1tm2P0928FF41Neh1dxf1940z5n7S8dxo43T6g..FontConstants ColorConstants..3cnG393..BorderConstants ToolbarConstants..ycl18835X6747H9Z50h8W4dFe25149bo304RIG93N7t1Pe92b8Twg3wWY69U3X3Cpjtd8qnN7H5iVn..ToolbarConstants DateTimeConstants..uu3zyr4h53A63IEla6I7j3afx1R76o0aNGP3f2w7pu59vN22l1709EEz4..UpDownConstants ToolTipConstants..U84p17fhV8OokkE34l7U0xK5A3y6L1082Pcx411cyW1Hm4e68dO8028YLXY6fF39u8hi06a752xw36792mNB..StructureConstants ComboConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):559
                                          Entropy (8bit):5.578481319894763
                                          Encrypted:false
                                          SSDEEP:12:eBL8ahqk4s/5fSnQZJRqRl0cXAsaqNwiQWJQ0PwqVTcr:G7fXZfuArZiQW+RqNcr
                                          MD5:BE9F2108A12DAC36C96143F18DABD7C4
                                          SHA1:39296ADBFD7D286761B852FE11CDA3F4C5B216F6
                                          SHA-256:5CE2B75147EFA4C68F705D38FEE5A39645732E372ADF0DB1258C378D2F32BCD5
                                          SHA-512:72B89735537CCB86BFFAFD0BA60B88BBBAB19CC1B54669BBC607AE4978E5170342746CDD9B51FF64998547F0AB03E672DAA09293913E0CE32E75C5AB9A115C1A
                                          Malicious:false
                                          Preview:46qd14AVyC80v7T21J3505tLfqkp957Hc33..DateTimeConstants ButtonConstants..NH7Z3E8iZvMKW03789WQ7L17u1XH1N6o4Z034X988KuH96R08HOkX0R49KN3WRoXM8wFReR060i3P496580y6g..ToolbarConstants ColorConstants..H44mEc77AhA17wC54S63288Um27ku4CaPv3WecF78e08x641cpD256u235667ne3Yo5IG0C47x4233RCvc617K975QV542EQ6z3L79GSb9sa31Sj404..DateTimeConstants ButtonConstants..O7vr40O9f7z05scW0I4VB7Q51RcO78CPJhwRkrDky54BoWO388hi9I9V9ooH03g0j79bgz1D9M747r6fWAzLH79Toc258nT0s2JNk37X..TreeViewConstants ToolTipConstants..C749E8U5n784d8O7PWC32f1Gurp5MAW4wz..ToolTipConstants DateTimeConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):506
                                          Entropy (8bit):5.57016122386182
                                          Encrypted:false
                                          SSDEEP:12:NcXkZO++dzQrtFPU6GXIvF+Vk+iyhDoTPReSh:NmyOJlQrQHuIVnNhqPRHh
                                          MD5:C23386A3C4259CFEF1A66D4CA934F4F7
                                          SHA1:C9ACFAFB5A1243BA6F4D0B6FEFF0574A787BDC6A
                                          SHA-256:BE788CEC245DF4F9ECE6960C67E243FE5F9A86555F9AB19069A148B960BA05CD
                                          SHA-512:CAF9D2019252A7B2D20FDD6A1F210FC5797C1A79566DDBDD1DCDBC1BA656D578EFA122ED2E6E2C058B4B7360382C8C7704BF02A1E7EB52EC3EAEC92816FE5729
                                          Malicious:false
                                          Preview:e22f2ET452yWCX5tGN92i886Cg7Y4W7H897030466CIm743h1N8a28d5445rcW9PBE9i63R6Y226p09b0701yEmD0dv4936lu13I788721uK95FLoin0rq8zvc9D13Edp235783Vw5e91HWD85ev6Po1QLqx2F75K8U38r4LN16xv..TreeViewConstants ColorConstants..2X7f3NN9Lv562zE3qhf2591x121Q0f683b1P57UOYRc983wQ7H43393z793uS070Pos47d2038p75T33B8YCVXEm2qHh8LP1Nm713s463MjEu7R1Ns61162M4966fu7a4NTaUO01T17s802B4MlAiFUMVh..ButtonConstants BorderConstants..6571GUS29U68m2feJ642qVQ3K84l16669ga9Ob2d717k08gnf94naLk4L35s6TkYVMunkW17..StructureConstants FileConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:dropped
                                          Size (bytes):111874
                                          Entropy (8bit):3.720029907971537
                                          Encrypted:false
                                          SSDEEP:1536:3wU1Zo3foIaXgwxInL+0wA67Td1uHSXeSXoWIcNIH0FIiVL32XclnW:5Zo3Ww7nLtzFH0uidmso
                                          MD5:EE0B6DCB2323FE5047DE83C300BE5C00
                                          SHA1:57510C2089062A35B49DCEFAD5F3552501698940
                                          SHA-256:8A7A595F49C43F8054F757A9FAE31D7D10177638ECA9D8060FC3A902A02785EA
                                          SHA-512:31D8AF76EF4B9992ADF5A4D78ED0C7231F35339EFA484D137519AB219EE76197669CBB18F1947D9A940E89A6A4655BA5D9757A68D604670F6134BAB83637358C
                                          Malicious:false
                                          Preview:0x4D5*9]]3]]]04]]]FFFF]]_8]]]]]]]4]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]08]]]]E/F_*0E]_409CD2/_80/4CCD2/546869732070726F67726/6D20636/6E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0*24]]]]]]]5045]]4C0/03]87F6*664]]]]]]]]E]]20/0_0/08]]FC]]]0*]]]]]]_E/*0/]]2]]]02]/]]]4]]02]]]]2]]04]]]]]]]04]]]]]]]]6]/]]02]]]]]]02]6085]]/]]0/]]]]0/]]0/]]]]]]0/]]]]]]]]]]]064/*0/]57]]]]2]/]FF07]]]]]]]]]]]]]]]]]]]4]/]0C]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]2]]]8]]]]]]]]]]]082]]048]]]]]]]]]]]2E74657874]]]C4F*]]]2]]]0FC]]]02]]]]]]]]]]]]]]2]]0602E72737263]]]FF07]]]2]/]]08]]]FE]]]]]]]]]]]]]]4]]0402E72656C6F63]]0C]]]]4]/]]02]]]060/]]]]]]]]]]]]]4]]042]]]]]]]]]]]]]]]]*0/*0/]]]]]48]]]02]05]2C7*]]38*]]]3]]]0/]]06]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]_FE_/E56F_CD973__2/9022430*57843]3D5644D2/E62_9D4F/80E7E6C3394/2E]2F]5C]]]/E0228/_]]0*2*/*7E/4]]042*/E0280/4]]042*/*7E/5]]042*/E0280/5]]042*/*7E/6]]042*/E0280/6]]042*/*7E/7]]042*/E0280/7]]042*/*7E/8]]042*/E0280/8]]042*/*7E/9]]042*/E0280/9]]042*/
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):506
                                          Entropy (8bit):5.666171253378064
                                          Encrypted:false
                                          SSDEEP:12:sPgke4xkWRqA31Ksr7cM7tpxmCcG+wNP1tN0xR:8kWRqGYMJpxfcMV1ExR
                                          MD5:65F980AE12661712717189653D4FB459
                                          SHA1:4B93F7848462CBD7741231E2BCE8CDF2548AA536
                                          SHA-256:6232B90F5A35F1A8105C8FBF655F5E49C01DA51A3CA19BEDCC895EB7A8800F23
                                          SHA-512:50F209EFA16D957B3C5986F447E34CDEA5C07BC73B20874BFBEF63DE9EC4E514041F05072D4CA794EF52E1309B4A68AC949504BEC854C308EF3AA6528F7C7800
                                          Malicious:false
                                          Preview:0l5h98veW4n14p4EA177ba79362Y2wF3xdR42730sP444JWVET5zL85JfwH3..StructureConstants GuiDateTimePicker..A0E9iRYw12ezA3qNz5g716K402r0dhqJi883PG521B9zFyCeBQ2Vk8DbM..ButtonConstants FontConstants..486VBc8w5795wafB7RQSS07P319E3Mt75AWo328N0ytb36qAjg89P08MUNl0939095V99spR8w89d78HX851dr4t2az00412057M95679fvop75767RgO89O089ALlw4514254..BorderConstants GuiDateTimePicker..l81n205eKc2m7uR2x63hN28Wp9UF26RXgu6W0I7Ua7c69yJFc32kL44t930vX2658F2HxzX8lmIs1O81D7cp3Q7Gn2A9wV315G2nElSk65y..GuiDateTimePicker ToolbarConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):529
                                          Entropy (8bit):5.658051500411973
                                          Encrypted:false
                                          SSDEEP:12:YfjJLkwhjXb9XwPAaxQg0QVahE/CY+M6OqpMBh:cD5BXwPVV0FhEr93Bh
                                          MD5:D09181BB1825EF873613B385AFE3250C
                                          SHA1:8CF113E3E8EAAA079994B76D4F0F2C1E112D5A3F
                                          SHA-256:618FC71415514061D83306C870ABCB07C760C6D163F623E18AFFF95232BEB828
                                          SHA-512:282B909F5E4FCA4CD5D0785943EABFAE7EB4B9DCE4D75B0BF828FF87238885742E512121CC61E9E30989A07E8C49F6AFBFBB78A9CA0DDCDF6F9C7E2A9E36E979
                                          Malicious:false
                                          Preview:A45w7T92Ea44F5AgKQ8Egy4g58Pz3lVx6eR13Z4hO96Og5D7W070Ng4x0Epvri0zI2FPJyL8w06nT15KD..GuiDateTimePicker DateTimeConstants..iq5q70X0GMe539563DW1knx61Z..ColorConstants GuiDateTimePicker..7dp4RcxMXAzO0HcEmiYVq213RV966MoExs8W4Hn2grVXtl9x86..GuiDateTimePicker ButtonConstants..ANha941m2894kJkH0h0Al4Gp72Z934Dl624x23D50BsS7ZX5CXZ136s7vt2p8SQ8M59n12g8vbc3qi82MHEkOqlW774AN84O4..UpDownConstants ComboConstants..0nGzv2604AR5B65NL5T78B1c383r9W0X27923r2td3d9Xr886w13u01mtd5914w76S4b4lO76n0k9x6u8x62X977HJ92V..StructureConstants FileConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with very long lines (378), with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):64360
                                          Entropy (8bit):3.021094753046138
                                          Encrypted:false
                                          SSDEEP:48:j////////////ZlslslslslslslslslslslslslslslslslslZHS///////////H:uHZQNB
                                          MD5:B94DDFC39C8E33D472BD5A2810F4E10D
                                          SHA1:C2A8F8C29DF1DDB170B8FA8FAB5170784F4A6DA7
                                          SHA-256:F97221732861050BD9DD4337FE23D51323336844A1AA68272AAC47E13840A734
                                          SHA-512:47606282D701241D934051390D41F31270D230C164B849CA741E59308D8749F0BAF137439D1814A61FD1AD79012FE14BB27B5290676F9BF0155F448188008946
                                          Malicious:true
                                          Preview:..T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.T.e.l.e.V.r.a.m.(.1.5.9.).:.....T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.l.e.V.r.a.m.(.2.5.).:.T.e.
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):543
                                          Entropy (8bit):5.379579425070494
                                          Encrypted:false
                                          SSDEEP:12:13Dfq3mDv9pRDvh9ECgfzpFP274UCxU8MV50:RrymJTh91gfRU+MV50
                                          MD5:F79437BF7C47B942F0ACC98DF6B7A39A
                                          SHA1:6444BFFC1EBA138320798797D178DFCC5585FF25
                                          SHA-256:01D356A3FB2EEC49DBF8D9C5D492FE0806CE2116BCE896A75E0AEA82D39C3D75
                                          SHA-512:7C0924D37164DD982ABDDF4F6472B390A43DFDD76ED67C58F106AFBDCE4237FDBE4C290C3987FCAFBC9E9E98EC4799D0A4AE193C4EC1133D173DF74A4CF01ECB
                                          Malicious:false
                                          Preview:I98S19d33sK00575VAU6Fx407gO75n3L5948F793QQgU49e386DxDs5a3Ifpyx8T8Vv8a..FileConstants UpDownConstants..1IQ30823111YURi4e01o24z30051Hcp191QR252n94T2y..ColorConstants StructureConstants..67RQ824E1E6npd1NbqsCyjqq73P925fTF03874udERo8HytQ11864h487B79ezr8q9Q6756..FileConstants BorderConstants..NHX6V8Na01T8..ColorConstants ToolTipConstants..fLj1457737knW558404SNzrZRxH2H8X4E253kj..TreeViewConstants ComboConstants..43Iq488m0452f5d0x8938z10q24e6035w2d5088Gh08JF7N..ComboConstants ButtonConstants..Q73C7opb0tI79S8o7..ToolTipConstants BorderConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):553
                                          Entropy (8bit):5.578486202825431
                                          Encrypted:false
                                          SSDEEP:12:H75sozL/bNXNtRuPDulvtGJE5iWQD1wGSAEvhUpTP9R23gUdR:H+CL/bNXfRDnG4iWgh+k2pdR
                                          MD5:2C51C68CC943271C2701E0A32DEF3088
                                          SHA1:C80F091FEEB6765E8A96E25DE77CAB01190B751A
                                          SHA-256:D8C1D6A7651B3D4906D2B480709B18E18AEA82E986FE3A7429F63E62D0D50A1F
                                          SHA-512:2CC8126DCE1CC9364452FA5F0B5459FD9C3E3DD47DC9AE37F20887C3985D29B182CE51C18FD7AFB34A2DD5A508C4D26E77870B403CDAC949B429C44D983CFEE0
                                          Malicious:false
                                          Preview:iZQ0P1Gf4xY4d6358QWA03xH353739406M72kSCwdq8gu8kLbV9i3D6J55CQ2zrdi520Vw70007J2..StructureConstants ComboConstants..16Tbb5L2Ned68zt2BD24804jAPGf..FileConstants ComboConstants..pal02OD2KA936z6Rr72m08MWMPO2148X562UEv565825b1XP86t3s0mF5Q3N5a5L6FM0k2S687u7g43vB45a2Cv7QxD2P85d1kzF4JHPe3s8ZBa0UrOocu..UpDownConstants FileConstants..8cL04j948tW49444MY5I743I4HID4eyTHpb712g71GEPL8N3nDiWL85Y69a0929W6b9E5ioMuW6656f9qsK1E250aw94p198sv3cA3L283C8737S1A6K5LmlWmr..TreeViewConstants StructureConstants..2BFt918C2UQZL18L760eDC997o072uA..FontConstants ToolbarConstants..
                                          Process:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):107038202
                                          Entropy (8bit):7.0176504307222
                                          Encrypted:false
                                          SSDEEP:24576:Q4sp4sq4se4ss4sY4sm4sB4se4sD4sp4sm4se4sI4sm4sn4sl4sR4sa4so4sb4sC:P1
                                          MD5:F057B0988F9E5636A46F6AA20C5C4B1E
                                          SHA1:F09E814CA0A3DE72C3FAE7132739814AD8EC5B38
                                          SHA-256:5A25D2F11687DAD3F76A7C72838DE513F8C024555FE041EF5E49AE5395C03F8C
                                          SHA-512:BC176B524177A4C4DA320460DED58ECE729149CF045EEA8B0C9FF0935241D54CF125AABAB7425A589824AB5E8BCCE1F91B2FB360066E0BD0AEE88FF162C9540B
                                          Malicious:false
                                          Preview:..;.v_.A=.uCZ...p.Yv&.z.H.t..y...g./...:....V)pa..l.t.T.U..Vb..S....y:.Q.....e......#.c.s..p,.....e......W.S.i....Y........JM.H[........6F..S..D.:..+.\...T.b..!....G.P-.).W....u.8.7.4.s.8.4.E.n.Y.7.4.8.N.c.0.6.8.i.V.4.V.0.t.2.r.c.S.i.0.k.9.3.B.8.4.2.L.s.V.8.7.8.S.......D..c...'...._......0.0.#{N....^.om...'.}...5.H.....[.5.uA.^.~...9JN...7..e.....{G..)+.N..."5`,...p8....6p.t..59.&.b......yA.....7%J....i...u.m..r.vk..4..e..:....A.~.G..s..Ovy..B.......3.P.&|).CA....1.5.2.o.t.7.8.4.8.b.8.Y.7.3.1.R.N.9.5.2.8.9.9.5.U.9.6.1.t.6.4...........x..y...)1.,Ti9.4.8.F.R:3L.c...y0c?Q..,?!P2[pj.......n.A.... .b.q.JV.*q......#..h_.F..i9.K~......}....i..Tm.49...%..W....Y.6.5.d.7.8.J.e.....2.b.k.P.q.P.8.v.A.A.....4.M.S.6.0.9.2.x.S.E.7.m.X.4.X.G.m.9.u.M.3.d.9.O.2.0.1.i.2.0.5.I.K.3.1.6.6.X.5.Y.h.7.5.T.D.C.1............V.U.o.}Gr.x..;....*.:*w..P.."...if<G..E.P.U^W*.MR.W&.(;1,.f./+:B.QA.f}."!..../\.x.}.7...C'...h.e...=.N.}....sd...gV.n........*..X.....`....*:.T5_.If......km.].^7
                                          Process:C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):77
                                          Entropy (8bit):4.866492516240338
                                          Encrypted:false
                                          SSDEEP:3:YRRvuf1lXhONvkY/ndY3t9Grdyn:AvgDO9k4drdy
                                          MD5:D27283F7FB3F72063B6A7E8894816482
                                          SHA1:A2238D9CBA0DF7E79BCC23804E9AE2FE635BAFC3
                                          SHA-256:DA779AB7242D8E25F24A398E68F62EB3FA0533E600E947AC1A302D2B5D079F32
                                          SHA-512:1CBE9B94279A45BF09B427C9D49D3C5A1B58145BDDF3277CB0E1A0A259286754C0CFCC60AB52800D14E2967F84C00C836BC407FF8C777E46CB03C7498921FBFA
                                          Malicious:false
                                          Preview:[S3tt!ng]..stpths=%userprofile%..Key=..Dir3ctory=uwrb..ExE_c=pjcvfvnncx.icm..
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.673598600663924
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:1wYGO0mAN2.exe
                                          File size:1'016'608 bytes
                                          MD5:436b2f74cd97649e20ced1dc65fb0b95
                                          SHA1:f96367071a2f3aa91a6c82968d542c80e670f1fe
                                          SHA256:e5bcb2a1cdf6cab62da5b7c8e8d78c25acb5627be5028fd5499df561fd4f24df
                                          SHA512:5535daf34f0e8d19f95ebf084fdfcf63f3e56f7dc8c562ca2b38212f8b3ad697e250a98d389722f673621201ff29e31c039b1a8e38504c55890993b38e734937
                                          SSDEEP:24576:hN/BUBb+tYjBFHL68/C6SnugzXiM0hD6di/AD:jpUlRhT/5OXiM0hDTc
                                          TLSH:5A250112B7C480B3D17229321AB69711167D7E711F658A8B13E03DBEAB719C2D631FA3
                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......v..p2.b#2.b#2.b#.E.#?.b#.E.#..b#.E.#*.b#...#0.b#..f"!.b#..a"*.b#..g"..b#;..#9.b#;..#5.b#2.c#,.b#..g"..b#..b"3.b#...#3.b#..`"3.b
                                          Icon Hash:260e087d1f333737
                                          Entrypoint:0x4265d0
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x6640971F [Sun May 12 10:17:03 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:1
                                          File Version Major:5
                                          File Version Minor:1
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:1
                                          Import Hash:99ee65c2db82c04251a5c24f214c8892
                                          Instruction
                                          call 00007FF004D0849Bh
                                          jmp 00007FF004D07E1Dh
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push ecx
                                          lea ecx, dword ptr [esp+08h]
                                          sub ecx, eax
                                          and ecx, 0Fh
                                          add eax, ecx
                                          sbb ecx, ecx
                                          or eax, ecx
                                          pop ecx
                                          jmp 00007FF004D074CFh
                                          push ecx
                                          lea ecx, dword ptr [esp+08h]
                                          sub ecx, eax
                                          and ecx, 07h
                                          add eax, ecx
                                          sbb ecx, ecx
                                          or eax, ecx
                                          pop ecx
                                          jmp 00007FF004D074B9h
                                          push ebp
                                          mov ebp, esp
                                          sub esp, 0Ch
                                          lea ecx, dword ptr [ebp-0Ch]
                                          call 00007FF004CFA9F9h
                                          push 0044634Ch
                                          lea eax, dword ptr [ebp-0Ch]
                                          push eax
                                          call 00007FF004D08CC7h
                                          int3
                                          jmp 00007FF004D0E9FEh
                                          int3
                                          int3
                                          push 004293C0h
                                          push dword ptr fs:[00000000h]
                                          mov eax, dword ptr [esp+10h]
                                          mov dword ptr [esp+10h], ebp
                                          lea ebp, dword ptr [esp+10h]
                                          sub esp, eax
                                          push ebx
                                          push esi
                                          push edi
                                          mov eax, dword ptr [00449778h]
                                          xor dword ptr [ebp-04h], eax
                                          xor eax, ebp
                                          push eax
                                          mov dword ptr [ebp-18h], esp
                                          push dword ptr [ebp-08h]
                                          mov eax, dword ptr [ebp-04h]
                                          mov dword ptr [ebp-04h], FFFFFFFEh
                                          mov dword ptr [ebp-08h], eax
                                          lea eax, dword ptr [ebp-10h]
                                          mov dword ptr fs:[00000000h], eax
                                          ret
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          mov ecx, dword ptr [ebp-10h]
                                          mov dword ptr fs:[00000000h], ecx
                                          pop ecx
                                          pop edi
                                          pop edi
                                          pop esi
                                          pop ebx
                                          mov esp, ebp
                                          pop ebp
                                          push ecx
                                          ret
                                          push ebp
                                          mov ebp, esp
                                          Programming Language:
                                          • [ C ] VS2008 SP1 build 30729
                                          • [IMP] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x47d700x34.rdata
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x47da40x50.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x15b18.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e0000x2afc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x445800x54.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x446000x18.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3ec580x40.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x3c0000x280.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4722c0x120.rdata
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x3a32c0x3a400e320764e1b3c816ba80aeb820cb8a274False0.581381605418455data6.685359764265178IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x3c0000xcbf80xcc0047c3be3304bfdfb2a778f355849d1c3fFalse0.4439529718137255data5.167069652624378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x490000xd7e00x12006335f9314c2900dccb530e151f1b1ee8False0.3956163194444444data4.0290550032041IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .didat0x570000x1a80x200232a8fe82993b55cefe09cffc39a79b0False0.462890625data3.5080985761326375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x580000x15b180x15c0001347fc060c4871e2beac057b6f6bee3False0.6677779274425287data6.453733102547725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x6e0000x2afc0x2c0098fd4bc572f87a21f69dc57f720a6dbcFalse0.75data6.617141671767599IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          PNG0x588240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                          PNG0x5936c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                          RT_ICON0x5a9180x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.32682926829268294
                                          RT_ICON0x5af800x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.43548387096774194
                                          RT_ICON0x5b2680x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.514344262295082
                                          RT_ICON0x5b4500x1c8Device independent bitmap graphic, 22 x 44 x 4, image size 2640.5241228070175439
                                          RT_ICON0x5b6180x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.5878378378378378
                                          RT_ICON0x5b7400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.5053304904051172
                                          RT_ICON0x5c5e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.634927797833935
                                          RT_ICON0x5ce900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.532258064516129
                                          RT_ICON0x5d5580x690Device independent bitmap graphic, 22 x 44 x 8, image size 528, 256 important colors0.544047619047619
                                          RT_ICON0x5dbe80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3872832369942196
                                          RT_ICON0x5e1500x8620PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9990097856477167
                                          RT_ICON0x667700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.34948132780082986
                                          RT_ICON0x68d180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.4376172607879925
                                          RT_ICON0x69dc00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.41721311475409834
                                          RT_ICON0x6a7480x810Device independent bitmap graphic, 22 x 44 x 32, image size 20240.48546511627906974
                                          RT_ICON0x6af580x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6214539007092199
                                          RT_DIALOG0x6b3c00x286dataEnglishUnited States0.5092879256965944
                                          RT_DIALOG0x6b6480x13adataEnglishUnited States0.60828025477707
                                          RT_DIALOG0x6b7840xecdataEnglishUnited States0.6991525423728814
                                          RT_DIALOG0x6b8700x12edataEnglishUnited States0.5927152317880795
                                          RT_DIALOG0x6b9a00x338dataEnglishUnited States0.45145631067961167
                                          RT_DIALOG0x6bcd80x252dataEnglishUnited States0.5757575757575758
                                          RT_STRING0x6bf2c0x1e2dataEnglishUnited States0.3900414937759336
                                          RT_STRING0x6c1100x1ccdataEnglishUnited States0.4282608695652174
                                          RT_STRING0x6c2dc0x1b8dataEnglishUnited States0.45681818181818185
                                          RT_STRING0x6c4940x146dataEnglishUnited States0.5153374233128835
                                          RT_STRING0x6c5dc0x46cdataEnglishUnited States0.3454063604240283
                                          RT_STRING0x6ca480x166dataEnglishUnited States0.49162011173184356
                                          RT_STRING0x6cbb00x152dataEnglishUnited States0.5059171597633136
                                          RT_STRING0x6cd040x10adataEnglishUnited States0.49624060150375937
                                          RT_STRING0x6ce100xbcdataEnglishUnited States0.6329787234042553
                                          RT_STRING0x6cecc0x1c0dataEnglishUnited States0.5178571428571429
                                          RT_STRING0x6d08c0x250dataEnglishUnited States0.44256756756756754
                                          RT_GROUP_ICON0x6d2dc0xe6data0.5739130434782609
                                          RT_MANIFEST0x6d3c40x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                          DLLImport
                                          KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA, FindNextFileA
                                          OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                          gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-12-31T20:51:33.222041+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1195.26.255.8177192.168.2.549737TCP
                                          2024-12-31T20:51:33.222041+01002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1195.26.255.8177192.168.2.549737TCP
                                          2024-12-31T20:51:33.222041+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1195.26.255.8177192.168.2.549737TCP
                                          2024-12-31T20:51:33.222041+01002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1195.26.255.8177192.168.2.549737TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 31, 2024 20:51:32.635922909 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:32.640680075 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:32.640780926 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:32.686495066 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:32.691361904 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:33.179943085 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:33.180000067 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:33.180059910 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:33.217194080 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:33.222040892 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:33.346460104 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:33.394397020 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:33.697846889 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:33.703341007 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:33.703510046 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:33.709765911 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:42.692740917 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:42.697545052 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:42.701033115 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:42.706670046 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:42.896037102 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:42.941298962 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:42.992691994 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:43.035044909 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:43.057322025 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:43.062079906 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:43.062216997 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:43.066982031 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:51.691862106 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:51.696696043 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:51.696753025 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:51.701596022 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:52.067167044 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:52.113204956 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:52.155936956 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:52.158015013 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:52.162777901 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:51:52.162836075 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:51:52.167666912 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:00.692094088 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:00.696964979 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:00.697060108 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:00.701802969 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:01.049283981 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:01.097594976 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:01.185415983 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:01.187536001 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:01.192363024 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:01.192424059 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:01.197184086 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:09.691999912 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:09.696886063 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:09.699337006 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:09.704145908 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:09.930404902 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:09.972522974 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:10.065345049 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:10.067194939 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:10.072009087 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:10.072066069 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:10.076920986 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:18.691890955 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:18.696871996 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:18.696933031 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:18.701793909 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:19.040235996 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:19.082021952 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:19.170722961 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:19.172637939 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:19.177618027 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:19.177678108 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:19.182466030 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:27.691778898 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:27.696686983 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:27.696773052 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:27.701678991 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:28.056433916 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:28.097589016 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:28.185478926 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:28.238173008 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:28.279810905 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:28.284595013 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:28.284646988 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:28.289387941 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:36.691773891 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:36.696913004 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:36.697031975 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:36.701867104 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.032808065 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.081903934 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:37.121463060 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.123308897 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:37.128160954 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.128215075 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:37.133033991 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.644795895 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:37.649904966 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.650088072 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:37.654922962 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.930682898 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:37.971754074 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:38.061423063 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:38.063199997 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:38.068171978 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:38.068249941 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:38.073121071 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:46.645088911 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:46.649988890 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:46.650089025 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:46.654922009 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:46.894185066 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:47.005069017 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:47.027137041 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:47.029454947 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:47.034310102 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:47.034363031 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:47.039247990 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:49.660604954 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:49.665493965 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:49.665559053 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:49.670373917 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:49.973880053 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.019784927 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:50.025235891 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.025314093 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:50.030141115 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.105338097 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.108849049 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:50.113665104 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.114173889 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:50.118953943 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.456501961 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.599106073 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:50.721858025 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.724390030 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:50.729139090 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:50.729201078 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:50.734010935 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:55.348155022 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:55.353013992 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:55.353064060 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:55.357867002 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:55.645828009 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:55.707025051 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:55.781459093 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:55.782814026 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:55.787606955 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:52:55.787678957 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:52:55.792443991 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:03.644818068 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:03.649689913 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:03.649753094 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:03.654504061 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:03.986855984 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:04.121275902 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:04.121373892 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:04.123466015 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:04.128319025 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:04.128426075 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:04.133198977 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:05.723215103 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:05.728043079 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:05.728094101 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:05.732860088 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:05.969939947 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:06.130054951 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:06.133536100 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:06.133536100 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:06.139031887 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:06.144098043 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:06.149672985 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:14.722918987 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:14.728049994 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:14.733223915 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:14.738146067 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:15.111334085 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:15.160037041 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:15.245352983 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:15.247323990 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:15.252087116 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:15.252130985 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:15.256853104 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:23.722960949 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:23.727911949 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:23.727999926 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:23.732774019 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:23.977061987 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:24.082314968 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:24.144390106 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:24.156831980 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:24.161619902 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:24.161683083 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:24.166487932 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:29.037112951 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:29.042031050 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:29.045226097 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:29.049979925 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:29.339502096 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:29.469413996 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:29.469541073 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:29.498631001 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:29.504102945 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:29.504147053 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:29.508929968 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:31.660686016 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:31.665596008 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:31.665644884 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:31.670419931 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:32.003082991 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:32.108879089 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:32.133826971 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:32.141122103 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:32.147799015 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:32.153155088 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:32.158447981 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:40.660712957 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:40.665515900 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:40.669238091 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:40.674046040 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:41.005693913 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:41.097523928 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:41.164303064 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:41.173214912 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:41.178047895 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:41.178090096 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:41.182862043 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:46.535564899 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:46.540450096 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:46.547997952 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:46.552829027 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:46.787461042 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:46.911348104 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:46.921226978 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:46.922873020 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:46.927660942 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:46.927747011 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:46.932599068 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:51.106096983 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:51.112334013 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:51.115386963 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:51.120129108 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:51.346381903 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:51.477624893 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:51.477694988 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:51.479566097 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:51.484296083 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:53:51.484378099 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:53:51.489175081 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:00.113950014 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:00.118825912 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:00.118905067 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:00.123689890 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:00.466291904 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:00.601303101 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:00.601365089 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:00.603780985 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:00.608556986 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:00.608597994 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:00.613339901 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:09.113677025 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:09.118618965 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:09.118693113 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:09.123404026 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:09.477639914 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:09.597240925 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:09.609390974 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:09.610955954 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:09.623778105 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:09.623845100 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:09.628571033 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:18.115310907 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:18.120187998 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:18.120258093 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:18.125021935 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:18.404274940 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:18.533365965 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:18.535413980 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:18.536761045 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:18.541558027 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:18.543211937 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:18.548036098 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:20.769910097 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:20.774775982 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:20.774848938 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:20.779598951 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:21.072566986 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:21.201849937 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:21.202023983 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:21.207294941 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:21.212198973 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:21.219436884 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:21.224272966 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:21.741173029 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:21.746491909 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:21.746694088 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:21.751418114 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:22.064801931 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:22.197233915 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:22.200259924 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:22.203192949 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:22.207962036 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:22.208132029 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:22.212953091 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:30.738636017 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:30.743443012 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:30.743503094 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:30.748270988 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:31.031626940 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:31.081929922 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:31.176472902 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:31.180130959 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:31.184916973 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:31.184966087 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:31.189733982 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:34.461765051 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:34.466594934 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:34.466650009 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:34.471399069 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:34.812752962 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:34.863151073 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:34.949246883 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:34.951181889 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:34.955915928 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:34.955960989 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:34.960695982 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:40.938041925 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:40.942903996 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:40.942960024 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:40.947746038 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:41.259845972 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:41.389231920 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:41.394536018 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:41.397192955 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:41.401942968 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:41.409198999 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:41.414067984 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:49.926548958 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:49.931380987 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:49.931509018 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:49.936265945 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:50.215301991 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:50.269402027 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:50.345266104 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:50.347131968 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:50.351965904 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:50.352046967 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:50.356781006 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:57.728151083 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:57.733355999 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:57.733453035 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:57.738189936 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:58.033380032 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:58.160141945 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:58.162496090 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:58.164217949 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:58.168987036 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:58.169044018 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:58.173858881 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:59.754261017 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:59.759263039 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:54:59.759363890 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:54:59.764223099 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:00.095544100 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:00.160065889 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:00.245745897 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:00.248450994 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:00.254375935 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:00.254427910 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:00.259207010 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.379362106 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:07.469693899 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.469747066 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:07.474709034 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.801462889 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.910686016 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:07.916404963 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.916497946 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:07.921247959 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.940665960 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.942785025 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:07.996551991 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:07.996666908 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:08.001465082 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:08.239726067 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:08.363173008 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:08.373212099 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:08.374932051 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:08.379698992 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:08.379760027 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:08.384540081 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:13.923388958 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:13.928426027 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:13.928492069 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:13.933293104 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:14.416711092 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:14.456974030 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:14.545492887 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:14.546278954 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:14.551194906 CET7749737195.26.255.81192.168.2.5
                                          Dec 31, 2024 20:55:14.551278114 CET4973777192.168.2.5195.26.255.81
                                          Dec 31, 2024 20:55:14.556314945 CET7749737195.26.255.81192.168.2.5

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:14:51:06
                                          Start date:31/12/2024
                                          Path:C:\Users\user\Desktop\1wYGO0mAN2.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\1wYGO0mAN2.exe"
                                          Imagebase:0xd60000
                                          File size:1'016'608 bytes
                                          MD5 hash:436B2F74CD97649E20CED1DC65FB0B95
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:14:51:10
                                          Start date:31/12/2024
                                          Path:C:\Windows\SysWOW64\wscript.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\tmsf.vbe"
                                          Imagebase:0x360000
                                          File size:147'456 bytes
                                          MD5 hash:FF00E0480075B095948000BDC66E81F0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:14:51:21
                                          Start date:31/12/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /release
                                          Imagebase:0x790000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:14:51:21
                                          Start date:31/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:14:51:21
                                          Start date:31/12/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\cmd.exe" /c pjcvfvnncx.icm vvcrvhm.bmp
                                          Imagebase:0x790000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:14:51:21
                                          Start date:31/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:14:51:21
                                          Start date:31/12/2024
                                          Path:C:\Windows\SysWOW64\ipconfig.exe
                                          Wow64 process (32bit):true
                                          Commandline:ipconfig /release
                                          Imagebase:0x610000
                                          File size:29'184 bytes
                                          MD5 hash:3A3B9A5E00EF6A3F83BF300E2B6B67BB
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:8
                                          Start time:14:51:21
                                          Start date:31/12/2024
                                          Path:C:\Users\user\AppData\Local\Temp\RarSFX0\pjcvfvnncx.icm
                                          Wow64 process (32bit):true
                                          Commandline:pjcvfvnncx.icm vvcrvhm.bmp
                                          Imagebase:0x4d0000
                                          File size:947'288 bytes
                                          MD5 hash:0ADB9B817F1DF7807576C2D7068DD931
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000008.00000003.2225217524.0000000001A0F000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000008.00000003.2225260589.0000000001970000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000008.00000003.2225397554.00000000041B4000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000008.00000003.2225738947.000000000194B000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000008.00000003.2223435934.000000000196C000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                          Antivirus matches:
                                          • Detection: 0%, ReversingLabs
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:10
                                          Start time:14:51:24
                                          Start date:31/12/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /renew
                                          Imagebase:0x790000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:11
                                          Start time:14:51:24
                                          Start date:31/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff6d64d0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:12
                                          Start time:14:51:24
                                          Start date:31/12/2024
                                          Path:C:\Windows\SysWOW64\ipconfig.exe
                                          Wow64 process (32bit):true
                                          Commandline:ipconfig /renew
                                          Imagebase:0x610000
                                          File size:29'184 bytes
                                          MD5 hash:3A3B9A5E00EF6A3F83BF300E2B6B67BB
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:13
                                          Start time:14:51:26
                                          Start date:31/12/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0xb10000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000D.00000002.4481126938.0000000000F02000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000D.00000002.4482482842.0000000003831000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:9.8%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:11.2%
                                            Total number of Nodes:1883
                                            Total number of Limit Nodes:48
                                            execution_graph 27734 d84cda 27735 d84c88 27734->27735 27735->27734 27737 d84fce 27735->27737 27763 d84d2c 27737->27763 27739 d84fde 27740 d8503b 27739->27740 27748 d8505f 27739->27748 27741 d84f6c DloadReleaseSectionWriteAccess 8 API calls 27740->27741 27742 d85046 RaiseException 27741->27742 27758 d85234 27742->27758 27743 d850d7 LoadLibraryExA 27744 d85138 27743->27744 27745 d850ea GetLastError 27743->27745 27746 d8514a 27744->27746 27747 d85143 FreeLibrary 27744->27747 27749 d850fd 27745->27749 27750 d85113 27745->27750 27751 d851a8 GetProcAddress 27746->27751 27757 d85206 27746->27757 27747->27746 27748->27743 27748->27744 27748->27746 27748->27757 27749->27744 27749->27750 27752 d84f6c DloadReleaseSectionWriteAccess 8 API calls 27750->27752 27753 d851b8 GetLastError 27751->27753 27751->27757 27754 d8511e RaiseException 27752->27754 27755 d851cb 27753->27755 27754->27758 27755->27757 27759 d84f6c DloadReleaseSectionWriteAccess 8 API calls 27755->27759 27774 d84f6c 27757->27774 27758->27735 27760 d851ec RaiseException 27759->27760 27761 d84d2c ___delayLoadHelper2@8 8 API calls 27760->27761 27762 d85203 27761->27762 27762->27757 27764 d84d38 27763->27764 27765 d84d5e 27763->27765 27782 d84dd5 27764->27782 27765->27739 27767 d84d59 27792 d84d5f GetModuleHandleW GetProcAddress GetProcAddress 27767->27792 27768 d84d3d 27768->27767 27787 d84efe 27768->27787 27771 d84fa7 27772 d84fc3 27771->27772 27773 d84fbf RtlReleaseSRWLockExclusive 27771->27773 27772->27739 27773->27739 27775 d84f7e 27774->27775 27776 d84fa0 27774->27776 27777 d84dd5 DloadReleaseSectionWriteAccess 4 API calls 27775->27777 27776->27758 27778 d84f83 27777->27778 27779 d84f9b 27778->27779 27780 d84efe DloadProtectSection 3 API calls 27778->27780 27795 d84fa2 GetModuleHandleW GetProcAddress GetProcAddress RtlReleaseSRWLockExclusive DloadReleaseSectionWriteAccess 27779->27795 27780->27779 27793 d84d5f GetModuleHandleW GetProcAddress GetProcAddress 27782->27793 27784 d84dda 27785 d84df2 RtlAcquireSRWLockExclusive 27784->27785 27786 d84df6 27784->27786 27785->27768 27786->27768 27788 d84f13 DloadProtectSection 27787->27788 27789 d84f19 27788->27789 27790 d84f4e VirtualProtect 27788->27790 27794 d84e14 VirtualQuery GetSystemInfo 27788->27794 27789->27767 27790->27789 27792->27771 27793->27784 27794->27790 27795->27776 27796 d84b8a 27797 d84b33 27796->27797 27797->27796 27798 d84fce ___delayLoadHelper2@8 17 API calls 27797->27798 27798->27797 27799 d6e3d5 27805 d6e3df 27799->27805 27801 d6e481 27802 d6e551 SetFilePointer 27803 d6e56e GetLastError 27802->27803 27804 d6e403 27802->27804 27803->27804 27806 d85734 27804->27806 27805->27802 27805->27804 27807 d8573c 27806->27807 27808 d8573d IsProcessorFeaturePresent 27806->27808 27807->27801 27810 d85bfc 27808->27810 27813 d85bbf SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 27810->27813 27812 d85cdf 27812->27801 27813->27812 27814 d61125 27819 d676e7 27814->27819 27816 d6112a 27827 d86029 29 API calls 27816->27827 27818 d61134 27820 d676f3 __EH_prolog3 27819->27820 27828 d70aaf 27820->27828 27822 d676fd 27831 d74f2b 27822->27831 27824 d67874 27835 d67cba GetCurrentProcess GetProcessAffinityMask 27824->27835 27826 d67891 27826->27816 27827->27818 27836 d70b05 27828->27836 27832 d74f37 __EH_prolog3 27831->27832 27845 d61ece 28 API calls 27832->27845 27834 d74f50 27834->27824 27835->27826 27837 d70b17 __cftof 27836->27837 27840 d776e5 27837->27840 27843 d776a7 GetCurrentProcess GetProcessAffinityMask 27840->27843 27844 d70b01 27843->27844 27844->27822 27845->27834 27846 d8437d 27847 d84389 __EH_prolog3_GS 27846->27847 27864 d74318 27847->27864 27853 d843dc 27875 d61a66 27853->27875 27857 d843f5 27882 d80678 PeekMessageW 27857->27882 27863 d84430 27888 d85787 27863->27888 27865 d74328 27864->27865 27891 d74349 27865->27891 27868 d76a25 27918 d768d4 27868->27918 27871 d625a4 27872 d625b2 27871->27872 27873 d625ad 27871->27873 27872->27853 27874 d61a66 26 API calls 27873->27874 27874->27872 27876 d61a80 27875->27876 27877 d61a71 27875->27877 27879 d61de7 27876->27879 27878 d612a7 26 API calls 27877->27878 27878->27876 27880 d61df3 SetDlgItemTextW 27879->27880 27881 d61df1 27879->27881 27880->27857 27881->27880 27883 d806cc 27882->27883 27884 d80693 GetMessageW 27882->27884 27883->27863 27887 d619a9 26 API calls 27883->27887 27885 d806b8 TranslateMessage DispatchMessageW 27884->27885 27886 d806a9 IsDialogMessageW 27884->27886 27885->27883 27886->27883 27886->27885 27887->27863 27889 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 27888->27889 27890 d84446 27889->27890 27897 d7347b 27891->27897 27894 d74346 27894->27868 27895 d7436c LoadStringW 27895->27894 27896 d74383 LoadStringW 27895->27896 27896->27894 27904 d7338e 27897->27904 27900 d734bc 27902 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 27900->27902 27903 d734d1 27902->27903 27903->27894 27903->27895 27905 d733c2 27904->27905 27913 d73445 _strncpy 27904->27913 27907 d733e2 27905->27907 27915 d789ed WideCharToMultiByte 27905->27915 27912 d73413 27907->27912 27916 d742b2 50 API calls __vsnprintf 27907->27916 27908 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 27909 d73474 27908->27909 27909->27900 27914 d734d5 26 API calls 27909->27914 27917 d8d097 26 API calls 3 library calls 27912->27917 27913->27908 27914->27900 27915->27907 27916->27912 27917->27913 27919 d768e0 __EH_prolog3_GS 27918->27919 27933 d7663b 27919->27933 27924 d76929 27931 d7696e 27924->27931 27946 d76a3d 27924->27946 27949 d67ff0 28 API calls 27924->27949 27926 d7698e 27930 d769d2 27926->27930 27951 d619a9 26 API calls 27926->27951 27927 d85787 5 API calls 27929 d769e8 27927->27929 27929->27871 27930->27927 27931->27926 27950 d67ff0 28 API calls 27931->27950 27934 d766df 27933->27934 27935 d76651 27933->27935 27937 d6adcc 27934->27937 27935->27934 27936 d61b63 28 API calls 27935->27936 27936->27935 27938 d6ae43 27937->27938 27941 d6addd 27937->27941 27959 d61a92 28 API calls std::_Xinvalid_argument 27938->27959 27945 d6ade8 27941->27945 27952 d612d3 28 API calls Concurrency::cancel_current_task 27941->27952 27943 d6ae17 27953 d611b8 27943->27953 27945->27924 28003 d6f68d 27946->28003 27949->27924 27950->27926 27951->27930 27952->27943 27954 d611c3 27953->27954 27955 d611cb 27953->27955 27974 d611dd 27954->27974 27956 d611c9 27955->27956 27960 d856f6 27955->27960 27956->27945 27962 d856fb 27960->27962 27963 d85715 27962->27963 27965 d85717 27962->27965 27983 d8d08c 27962->27983 27997 d8e91a 7 API calls 2 library calls 27962->27997 27963->27956 27966 d61a25 Concurrency::cancel_current_task 27965->27966 27967 d85721 27965->27967 27990 d8734a 27966->27990 27969 d8734a _com_raise_error RaiseException 27967->27969 27971 d86628 27969->27971 27970 d61a41 27972 d61a5a 27970->27972 27993 d612a7 27970->27993 27972->27956 27975 d61206 27974->27975 27976 d611e8 27974->27976 28002 d61a25 27 API calls 2 library calls 27975->28002 27977 d856f6 28 API calls 27976->27977 27979 d611ee 27977->27979 27981 d611f5 27979->27981 28001 d8ac9e 26 API calls _abort 27979->28001 27980 d6120b 27981->27956 27988 d9040e _abort 27983->27988 27984 d9044c 27999 d901d3 20 API calls _abort 27984->27999 27985 d90437 RtlAllocateHeap 27987 d9044a 27985->27987 27985->27988 27987->27962 27988->27984 27988->27985 27998 d8e91a 7 API calls 2 library calls 27988->27998 27991 d87391 RaiseException 27990->27991 27992 d87364 27990->27992 27991->27970 27992->27991 27994 d612b4 27993->27994 27996 d612c1 27993->27996 28000 d619a9 26 API calls 27994->28000 27996->27972 27997->27962 27998->27988 27999->27987 28000->27996 28002->27980 28004 d6f6a4 __vsnwprintf_l 28003->28004 28007 d8cee1 28004->28007 28010 d8afa4 28007->28010 28011 d8afcc 28010->28011 28012 d8afe4 28010->28012 28027 d901d3 20 API calls _abort 28011->28027 28012->28011 28013 d8afec 28012->28013 28029 d8b543 38 API calls 2 library calls 28013->28029 28016 d8afd1 28028 d8ac8e 26 API calls _abort 28016->28028 28017 d8affc 28030 d8b50e 20 API calls 2 library calls 28017->28030 28019 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28021 d6f6ae 28019->28021 28021->27924 28022 d8b074 28031 d8b8f3 51 API calls 3 library calls 28022->28031 28025 d8b07f 28032 d8b5c6 20 API calls _free 28025->28032 28026 d8afdc 28026->28019 28027->28016 28028->28026 28029->28017 28030->28022 28031->28025 28032->28026 28033 d6e0b0 28034 d6e0c9 28033->28034 28039 d6e850 28034->28039 28036 d6e0fb 28037 d6e850 111 API calls 28037->28036 28040 d6e862 28039->28040 28042 d6e875 28039->28042 28041 d6e0cd 28040->28041 28048 d69490 109 API calls 28040->28048 28041->28037 28042->28041 28044 d6e888 SetFilePointer 28042->28044 28044->28041 28045 d6e8a4 GetLastError 28044->28045 28045->28041 28046 d6e8ae 28045->28046 28046->28041 28049 d69490 109 API calls 28046->28049 28048->28042 28049->28041 28050 d85680 28051 d85696 _com_error::_com_error 28050->28051 28052 d8734a _com_raise_error RaiseException 28051->28052 28053 d856a4 28052->28053 28054 d84fce ___delayLoadHelper2@8 17 API calls 28053->28054 28055 d856bc 28054->28055 28056 d80900 28057 d8090f __EH_prolog3_catch_GS 28056->28057 28302 d61e44 28057->28302 28060 d8125b 28408 d83796 28060->28408 28061 d80940 28065 d80a20 28061->28065 28066 d80951 28061->28066 28108 d8095f 28061->28108 28068 d80ab0 28065->28068 28073 d80a36 28065->28073 28071 d8095a 28066->28071 28072 d809fc 28066->28072 28312 d61ce2 28068->28312 28069 d8128a 28074 d812a3 GetDlgItem SendMessageW 28069->28074 28075 d81293 SendDlgItemMessageW 28069->28075 28070 d8127b SendMessageW 28070->28069 28080 d74318 53 API calls 28071->28080 28071->28108 28077 d80a15 EndDialog 28072->28077 28072->28108 28078 d74318 53 API calls 28073->28078 28427 d71309 28074->28427 28075->28074 28077->28108 28082 d80a53 SetDlgItemTextW 28078->28082 28084 d8098d 28080->28084 28087 d80a5f 28082->28087 28083 d812e3 GetDlgItem 28088 d81302 28083->28088 28462 d61900 29 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28084->28462 28085 d80acb EndDialog 28171 d80ae4 28085->28171 28086 d80b01 GetDlgItem 28091 d80b38 SetFocus 28086->28091 28092 d80b15 SendMessageW SendMessageW 28086->28092 28096 d80a68 GetMessageW 28087->28096 28087->28108 28436 d61e05 28088->28436 28097 d80b48 28091->28097 28098 d80b6f 28091->28098 28092->28091 28094 d80994 28095 d809a4 28094->28095 28101 d61de7 SetDlgItemTextW 28094->28101 28095->28108 28463 d619a9 26 API calls 28095->28463 28103 d80a7f IsDialogMessageW 28096->28103 28096->28108 28105 d74318 53 API calls 28097->28105 28485 d67673 28098->28485 28099 d8130c 28439 d7f2ce GetClassNameW 28099->28439 28101->28095 28103->28087 28109 d80a8e TranslateMessage DispatchMessageW 28103->28109 28104 d8113a 28110 d74318 53 API calls 28104->28110 28111 d80b52 28105->28111 28464 d85796 28108->28464 28109->28087 28116 d8114b SetDlgItemTextW 28110->28116 28467 d614a7 28111->28467 28112 d61a66 26 API calls 28112->28108 28120 d81160 28116->28120 28119 d80b88 28124 d74318 53 API calls 28119->28124 28125 d74318 53 API calls 28120->28125 28123 d81346 28130 d81377 28123->28130 28134 d74318 53 API calls 28123->28134 28129 d80b9f 28124->28129 28127 d8117e 28125->28127 28126 d80b6a 28131 d61a66 26 API calls 28126->28131 28132 d614a7 28 API calls 28127->28132 28128 d81d4f 48 API calls 28128->28123 28133 d76a25 53 API calls 28129->28133 28135 d81d4f 48 API calls 28130->28135 28193 d81490 28130->28193 28136 d80bce 28131->28136 28137 d81187 28132->28137 28139 d80ba9 28133->28139 28140 d81359 SetDlgItemTextW 28134->28140 28141 d8138d 28135->28141 28142 d80be0 28136->28142 28490 d83d64 26 API calls __EH_prolog3_GS 28136->28490 28143 d811f5 28137->28143 28154 d614a7 28 API calls 28137->28154 28138 d81595 28149 d815ad 28138->28149 28150 d815a0 EnableWindow 28138->28150 28144 d83572 21 API calls 28139->28144 28145 d74318 53 API calls 28140->28145 28159 d813ad 28141->28159 28188 d813ce 28141->28188 28148 d80c07 28142->28148 28491 d6ed0d 28142->28491 28147 d74318 53 API calls 28143->28147 28151 d80bbb 28144->28151 28152 d8136d SetDlgItemTextW 28145->28152 28153 d811ff 28147->28153 28326 d6eaf3 28148->28326 28156 d815c8 28149->28156 28521 d61cc4 GetDlgItem KiUserCallbackDispatcher 28149->28521 28150->28149 28157 d61a66 26 API calls 28151->28157 28152->28130 28160 d614a7 28 API calls 28153->28160 28161 d811a6 28154->28161 28158 d815f0 28156->28158 28179 d815e8 SendMessageW 28156->28179 28157->28126 28158->28171 28180 d74318 53 API calls 28158->28180 28518 d7e265 34 API calls __EH_prolog3_GS 28159->28518 28168 d8120b 28160->28168 28172 d74318 53 API calls 28161->28172 28163 d81d4f 48 API calls 28163->28193 28166 d81560 28520 d7e265 34 API calls __EH_prolog3_GS 28166->28520 28184 d614a7 28 API calls 28168->28184 28169 d815bf 28522 d61cc4 GetDlgItem KiUserCallbackDispatcher 28169->28522 28171->28112 28197 d811b6 28172->28197 28174 d80c20 GetLastError 28175 d80c2b 28174->28175 28336 d72226 28175->28336 28179->28158 28186 d81609 SetDlgItemTextW 28180->28186 28181 d80c01 28494 d7fa79 25 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28181->28494 28182 d80c40 28189 d80c4c GetLastError 28182->28189 28190 d80c5d 28182->28190 28183 d81587 28191 d61a66 26 API calls 28183->28191 28192 d81224 28184->28192 28185 d614a7 28 API calls 28185->28193 28186->28171 28194 d81d4f 48 API calls 28188->28194 28228 d8147c 28188->28228 28189->28190 28199 d80c79 GetTickCount 28190->28199 28206 d80d0f 28190->28206 28263 d80cfd 28190->28263 28195 d81593 28191->28195 28204 d61a66 26 API calls 28192->28204 28193->28138 28193->28166 28193->28185 28196 d74318 53 API calls 28193->28196 28239 d61a66 26 API calls 28193->28239 28198 d81405 28194->28198 28195->28138 28196->28193 28214 d61a66 26 API calls 28197->28214 28201 d8140e DialogBoxParamW 28198->28201 28198->28228 28339 d6325c 28199->28339 28200 d81046 28371 d61e1f GetDlgItem ShowWindow 28200->28371 28202 d8142c EndDialog 28201->28202 28201->28228 28202->28108 28208 d81448 28202->28208 28210 d81243 28204->28210 28207 d80f94 28206->28207 28495 d713f9 28206->28495 28207->28085 28516 d69733 28 API calls _wcslen 28207->28516 28208->28108 28519 d619a9 26 API calls 28208->28519 28217 d61a66 26 API calls 28210->28217 28211 d8105b 28372 d61e1f GetDlgItem ShowWindow 28211->28372 28215 d811e9 28214->28215 28222 d61a66 26 API calls 28215->28222 28225 d8124e 28217->28225 28219 d80fae 28234 d74318 53 API calls 28219->28234 28220 d80d39 28506 d7505a 114 API calls 28220->28506 28222->28143 28224 d80c9f 28229 d61a66 26 API calls 28224->28229 28230 d61a66 26 API calls 28225->28230 28226 d81064 28231 d74318 53 API calls 28226->28231 28227 d80d51 28237 d76a25 53 API calls 28227->28237 28228->28163 28232 d80cab 28229->28232 28230->28171 28233 d8106e SetDlgItemTextW 28231->28233 28349 d6de9a 28232->28349 28373 d61e1f GetDlgItem ShowWindow 28233->28373 28236 d80fd4 28234->28236 28245 d61a66 26 API calls 28236->28245 28250 d80d80 GetCommandLineW 28237->28250 28238 d81082 SetDlgItemTextW GetDlgItem 28241 d8109f GetWindowLongW SetWindowLongW 28238->28241 28242 d810b7 28238->28242 28239->28193 28241->28242 28374 d81d4f 28242->28374 28249 d80fea 28245->28249 28246 d80cd5 GetLastError 28247 d80ce0 28246->28247 28362 d6ddc7 28247->28362 28254 d61a66 26 API calls 28249->28254 28258 d80e05 _wcslen 28250->28258 28253 d81d4f 48 API calls 28257 d810ce 28253->28257 28255 d80ff6 28254->28255 28265 d74318 53 API calls 28255->28265 28394 d83c78 28257->28394 28507 d80405 5 API calls 2 library calls 28258->28507 28260 d61a66 26 API calls 28260->28263 28262 d80e23 28508 d80405 5 API calls 2 library calls 28262->28508 28263->28200 28263->28206 28268 d8100c 28265->28268 28267 d81d4f 48 API calls 28276 d810ef 28267->28276 28271 d614a7 28 API calls 28268->28271 28269 d80e2f 28509 d80405 5 API calls 2 library calls 28269->28509 28270 d81110 28517 d61cc4 GetDlgItem KiUserCallbackDispatcher 28270->28517 28274 d81015 28271->28274 28281 d61a66 26 API calls 28274->28281 28275 d80e3b 28510 d75109 114 API calls 28275->28510 28276->28270 28279 d81d4f 48 API calls 28276->28279 28277 d80af5 28277->28085 28277->28104 28279->28270 28280 d80e4e 28511 d83e53 28 API calls __EH_prolog3 28280->28511 28283 d81031 28281->28283 28285 d61a66 26 API calls 28283->28285 28284 d80e6b CreateFileMappingW 28286 d80e9d MapViewOfFile 28284->28286 28287 d80ed5 ShellExecuteExW 28284->28287 28285->28085 28288 d80ed2 __InternalCxxFrameHandler 28286->28288 28289 d80ef3 28287->28289 28288->28287 28290 d80f3d 28289->28290 28291 d80f00 WaitForInputIdle 28289->28291 28294 d80f60 UnmapViewOfFile CloseHandle 28290->28294 28295 d80f73 28290->28295 28292 d80f1e 28291->28292 28292->28290 28293 d80f23 Sleep 28292->28293 28293->28290 28293->28292 28294->28295 28512 d62e8b 28295->28512 28298 d61a66 26 API calls 28299 d80f83 28298->28299 28300 d61a66 26 API calls 28299->28300 28301 d80f8e 28300->28301 28301->28207 28303 d61ea6 28302->28303 28304 d61e4d 28302->28304 28524 d73e83 GetWindowLongW SetWindowLongW 28303->28524 28306 d61eb3 28304->28306 28523 d73eaa 64 API calls 3 library calls 28304->28523 28306->28060 28306->28061 28306->28108 28308 d61e6f 28308->28306 28309 d61e82 GetDlgItem 28308->28309 28309->28306 28310 d61e92 28309->28310 28310->28306 28311 d61e98 SetWindowTextW 28310->28311 28311->28306 28525 d857d8 28312->28525 28314 d61cee GetDlgItem 28315 d61d1d 28314->28315 28316 d61d0b 28314->28316 28526 d61d64 28315->28526 28317 d614a7 28 API calls 28316->28317 28319 d61d18 28317->28319 28320 d61d4d 28319->28320 28321 d61a66 26 API calls 28319->28321 28322 d61d5a 28320->28322 28323 d61a66 26 API calls 28320->28323 28321->28320 28324 d85787 5 API calls 28322->28324 28323->28322 28325 d61d61 28324->28325 28325->28085 28325->28086 28325->28277 28333 d6eaff __EH_prolog3_GS 28326->28333 28327 d85787 5 API calls 28328 d6ebb6 28327->28328 28328->28174 28328->28175 28329 d6eb84 28330 d6efef 54 API calls 28329->28330 28332 d6eb09 28329->28332 28330->28332 28332->28327 28333->28329 28333->28332 28335 d61a66 26 API calls 28333->28335 28539 d6769f 28333->28539 28546 d6efef 28333->28546 28335->28333 28337 d72232 SetCurrentDirectoryW 28336->28337 28338 d72230 28336->28338 28337->28182 28338->28337 28340 d63280 28339->28340 28657 d62f0f 28340->28657 28343 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28344 d6329d 28343->28344 28345 d62f45 28344->28345 28346 d62f55 _wcslen 28345->28346 28661 d65962 28346->28661 28348 d62f63 28348->28224 28351 d6dea6 __EH_prolog3_GS 28349->28351 28350 d6def4 28353 d6df9e 28350->28353 28354 d7169a 47 API calls 28350->28354 28351->28350 28352 d6df09 CreateFileW 28351->28352 28352->28350 28356 d85787 5 API calls 28353->28356 28355 d6df49 28354->28355 28357 d6df6e 28355->28357 28359 d6df56 28355->28359 28360 d6df59 CreateFileW 28355->28360 28358 d6dfdf 28356->28358 28357->28353 28670 d619a9 26 API calls 28357->28670 28358->28246 28358->28247 28359->28360 28360->28357 28363 d6de09 28362->28363 28364 d6ddf8 28362->28364 28365 d61a66 26 API calls 28363->28365 28364->28363 28367 d6de04 28364->28367 28368 d6de0b 28364->28368 28366 d6de18 28365->28366 28366->28260 28671 d6dfe2 28367->28671 28676 d6de50 28368->28676 28371->28211 28372->28226 28373->28238 28385 d81d5e __EH_prolog3_GS 28374->28385 28376 d8349a 28377 d61a66 26 API calls 28376->28377 28378 d834a5 28377->28378 28379 d85787 5 API calls 28378->28379 28380 d810c5 28379->28380 28380->28253 28381 d6769f 45 API calls 28381->28385 28382 d625a4 26 API calls 28382->28385 28383 d614a7 28 API calls 28383->28385 28385->28376 28385->28381 28385->28382 28385->28383 28386 d7645a 28 API calls 28385->28386 28389 d61a66 26 API calls 28385->28389 28390 d834ad 28385->28390 28697 d8030a 28385->28697 28701 d762cd 30 API calls 2 library calls 28385->28701 28702 d7f5b2 28 API calls 28385->28702 28703 d6adaa CompareStringW 28385->28703 28704 d844c0 26 API calls 28385->28704 28386->28385 28389->28385 28705 d658cb 45 API calls 28390->28705 28395 d83c87 __EH_prolog3_catch_GS _wcslen 28394->28395 28711 d76a89 28395->28711 28397 d83cba 28715 d67903 28397->28715 28406 d85796 5 API calls 28407 d810e0 28406->28407 28407->28267 29543 d7eaa6 28408->29543 28411 d83885 28413 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28411->28413 28412 d837bf GetWindow 28412->28411 28417 d837d8 28412->28417 28414 d81266 28413->28414 28414->28069 28414->28070 28415 d837e5 GetClassNameW 29548 d78da4 CompareStringW 28415->29548 28417->28411 28417->28415 28418 d83809 GetWindowLongW 28417->28418 28419 d8386d GetWindow 28417->28419 28418->28419 28420 d83819 SendMessageW 28418->28420 28419->28411 28419->28417 28420->28419 28421 d8382f GetObjectW 28420->28421 29549 d7eae5 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28421->29549 28423 d83846 29550 d7eac4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28423->29550 29551 d7ef21 13 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28423->29551 28426 d83857 SendMessageW DeleteObject 28426->28419 29554 d857a5 28427->29554 28429 d71315 GetCurrentDirectoryW 28430 d71327 28429->28430 28434 d71323 28429->28434 29555 d61bbd 28 API calls 28430->29555 28432 d71339 GetCurrentDirectoryW 28433 d71356 _wcslen 28432->28433 28433->28434 28435 d612a7 26 API calls 28433->28435 28434->28083 28435->28434 28437 d61e11 SetWindowTextW 28436->28437 28438 d61e0f 28436->28438 28437->28099 28438->28437 28440 d7f2f9 28439->28440 28445 d7f31e 28439->28445 29556 d78da4 CompareStringW 28440->29556 28442 d7f30c 28444 d7f310 FindWindowExW 28442->28444 28442->28445 28443 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28446 d7f337 28443->28446 28444->28445 28445->28443 28447 d7fdd1 28446->28447 28448 d7fded 28447->28448 28449 d620b0 30 API calls 28448->28449 28450 d7fe27 28449->28450 29557 d62dbb 28450->29557 28453 d7fe43 28456 d6232c 123 API calls 28453->28456 28454 d7fe4c 29564 d6278b 28454->29564 28458 d7fe48 28456->28458 28460 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28458->28460 28459 d6232c 123 API calls 28459->28458 28461 d7fe77 28460->28461 28461->28123 28461->28128 28462->28094 28463->28108 28465 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28464->28465 28466 d857a0 28465->28466 28466->28466 28468 d614bd _wcslen 28467->28468 28469 d6120c 28 API calls 28468->28469 28470 d614ca 28469->28470 28471 d83572 28470->28471 28472 d80678 5 API calls 28471->28472 28473 d8358d GetDlgItem 28472->28473 28474 d835ac 28473->28474 28475 d835e4 SendMessageW SendMessageW 28473->28475 28480 d835b7 ShowWindow SendMessageW SendMessageW 28474->28480 28476 d83643 SendMessageW 28475->28476 28477 d83624 28475->28477 28478 d8365b 28476->28478 28479 d8365d SendMessageW SendMessageW 28476->28479 28477->28476 28478->28479 28481 d8367f SendMessageW 28479->28481 28482 d836a2 SendMessageW 28479->28482 28480->28475 28481->28482 28483 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28482->28483 28484 d836c0 28483->28484 28484->28126 28486 d6768c 28485->28486 29648 d67430 28486->29648 28488 d67699 28489 d834eb 28 API calls __EH_prolog3_GS 28488->28489 28489->28119 28490->28142 28492 d6ed1f 49 API calls 28491->28492 28493 d6ed16 28492->28493 28493->28148 28493->28181 28494->28148 28496 d71405 __EH_prolog3 28495->28496 28497 d856f6 28 API calls 28496->28497 28500 d7140f 28497->28500 28498 d71431 GetModuleFileNameW 28499 d71463 28498->28499 28498->28500 28502 d614a7 28 API calls 28499->28502 28500->28498 28500->28499 28501 d61be3 28 API calls 28500->28501 28501->28500 28503 d7146c 28502->28503 28504 d612a7 26 API calls 28503->28504 28505 d7147f 28503->28505 28504->28505 28505->28220 28506->28227 28507->28262 28508->28269 28509->28275 28510->28280 28511->28284 28513 d62e93 28512->28513 28514 d62ea0 28512->28514 28515 d612a7 26 API calls 28513->28515 28514->28298 28515->28514 28516->28219 28517->28277 28518->28188 28519->28228 28520->28183 28521->28169 28522->28156 28523->28308 28524->28306 28525->28314 28537 d857d8 28526->28537 28528 d61d70 GetWindowTextLengthW 28538 d61bbd 28 API calls 28528->28538 28530 d61dab GetWindowTextW 28531 d614a7 28 API calls 28530->28531 28532 d61dca 28531->28532 28533 d61ddd 28532->28533 28534 d612a7 26 API calls 28532->28534 28535 d85787 5 API calls 28533->28535 28534->28533 28536 d61de4 28535->28536 28536->28319 28537->28528 28538->28530 28540 d676e1 28539->28540 28541 d676bb 28539->28541 28574 d658cb 45 API calls 28540->28574 28565 d6120c 28541->28565 28545 d676db 28545->28333 28549 d6effb __EH_prolog3_GS 28546->28549 28547 d6f02f 28550 d6ed0d 49 API calls 28547->28550 28548 d6f01b CreateDirectoryW 28548->28547 28551 d6f0d0 28548->28551 28549->28547 28549->28548 28552 d6f03b 28550->28552 28553 d6f0df 28551->28553 28577 d6f58b 28551->28577 28554 d6f0e3 GetLastError 28552->28554 28590 d7169a 28552->28590 28557 d85787 5 API calls 28553->28557 28554->28553 28560 d6f100 28557->28560 28559 d6f07d 28564 d6f0ad 28559->28564 28647 d619a9 26 API calls 28559->28647 28560->28333 28561 d6f073 CreateDirectoryW 28561->28559 28562 d6f070 28562->28561 28564->28551 28564->28554 28566 d6127d 28565->28566 28569 d6121d 28565->28569 28576 d61a92 28 API calls std::_Xinvalid_argument 28566->28576 28573 d61228 28569->28573 28575 d612d3 28 API calls Concurrency::cancel_current_task 28569->28575 28571 d61254 28572 d611b8 28 API calls 28571->28572 28572->28573 28573->28545 28575->28571 28578 d6f597 __EH_prolog3_GS 28577->28578 28579 d6f5a4 SetFileAttributesW 28578->28579 28580 d6f5b7 28579->28580 28588 d6f622 28579->28588 28582 d7169a 47 API calls 28580->28582 28581 d85787 5 API calls 28583 d6f638 28581->28583 28584 d6f5d7 28582->28584 28583->28553 28585 d6f5f6 28584->28585 28586 d6f5e7 SetFileAttributesW 28584->28586 28587 d6f5e4 28584->28587 28585->28588 28648 d619a9 26 API calls 28585->28648 28586->28585 28587->28586 28588->28581 28591 d716e7 28590->28591 28592 d716e0 28590->28592 28593 d614a7 28 API calls 28591->28593 28594 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28592->28594 28596 d716f4 28593->28596 28595 d6f063 28594->28595 28595->28559 28595->28561 28595->28562 28597 d71711 28596->28597 28598 d717db 28596->28598 28600 d7171b 28597->28600 28601 d71741 28597->28601 28599 d71309 30 API calls 28598->28599 28604 d717fb 28599->28604 28649 d70ba6 28 API calls 28600->28649 28612 d71739 28601->28612 28617 d6769f 45 API calls 28601->28617 28603 d71729 28607 d625a4 26 API calls 28603->28607 28606 d718ed 28604->28606 28610 d71875 28604->28610 28611 d7181f 28604->28611 28605 d61a66 26 API calls 28605->28592 28606->28612 28656 d619a9 26 API calls 28606->28656 28609 d71731 28607->28609 28613 d61a66 26 API calls 28609->28613 28654 d70ba6 28 API calls 28610->28654 28652 d70c41 28 API calls 28611->28652 28612->28605 28613->28612 28615 d71883 28618 d625a4 26 API calls 28615->28618 28620 d71789 28617->28620 28621 d7188c 28618->28621 28619 d71838 28653 d61188 28 API calls 28619->28653 28650 d70bf3 28 API calls _wcslen 28620->28650 28625 d61a66 26 API calls 28621->28625 28624 d7179e 28651 d6aef3 28 API calls 28624->28651 28628 d71894 28625->28628 28626 d71848 28632 d625a4 26 API calls 28626->28632 28655 d70ddb 28 API calls 28628->28655 28629 d717b2 28631 d625a4 26 API calls 28629->28631 28633 d717be 28631->28633 28634 d71860 28632->28634 28635 d61a66 26 API calls 28633->28635 28636 d61a66 26 API calls 28634->28636 28638 d717c6 28635->28638 28640 d71868 28636->28640 28637 d6769f 45 API calls 28643 d71870 28637->28643 28642 d61a66 26 API calls 28638->28642 28639 d7189c 28639->28637 28641 d61a66 26 API calls 28640->28641 28641->28643 28644 d717ce 28642->28644 28646 d61a66 26 API calls 28643->28646 28645 d61a66 26 API calls 28644->28645 28645->28612 28646->28606 28647->28564 28648->28588 28649->28603 28650->28624 28651->28629 28652->28619 28653->28626 28654->28615 28655->28639 28656->28612 28658 d62f26 28657->28658 28659 d62f2f 28657->28659 28658->28343 28660 d6120c 28 API calls 28659->28660 28660->28658 28662 d65975 28661->28662 28663 d65a3a 28661->28663 28667 d65987 28662->28667 28668 d63029 28 API calls 28662->28668 28669 d658cb 45 API calls 28663->28669 28667->28348 28668->28667 28670->28353 28672 d6e015 28671->28672 28673 d6dfeb 28671->28673 28672->28363 28673->28672 28682 d6ec63 28673->28682 28677 d6de5c 28676->28677 28678 d6de76 28676->28678 28677->28678 28680 d6de68 CloseHandle 28677->28680 28679 d6de95 28678->28679 28696 d6925b 109 API calls 28678->28696 28679->28363 28680->28678 28683 d6ec6f __EH_prolog3_GS 28682->28683 28684 d6ec7c DeleteFileW 28683->28684 28685 d6ec8c 28684->28685 28693 d6ecf4 28684->28693 28687 d7169a 47 API calls 28685->28687 28686 d85787 5 API calls 28688 d6e013 28686->28688 28689 d6ecac 28687->28689 28688->28363 28690 d6ecc8 28689->28690 28691 d6ecbc DeleteFileW 28689->28691 28692 d6ecb9 28689->28692 28690->28693 28695 d619a9 26 API calls 28690->28695 28691->28690 28692->28691 28693->28686 28695->28693 28696->28679 28698 d8031d 28697->28698 28699 d80324 28697->28699 28698->28385 28699->28698 28706 d61b63 28699->28706 28701->28385 28702->28385 28703->28385 28704->28385 28707 d61b8e 28706->28707 28708 d61b6f 28706->28708 28710 d613f7 28 API calls 28707->28710 28708->28699 28710->28708 28712 d76a99 _wcslen 28711->28712 28766 d61be3 28712->28766 28714 d76abb 28714->28397 28716 d76a74 28715->28716 28717 d76a89 28 API calls 28716->28717 28718 d76a86 28717->28718 28719 d6b03d 28718->28719 28720 d6b049 __EH_prolog3_GS 28719->28720 28771 d72815 28720->28771 28722 d6b092 28777 d6b231 28722->28777 28725 d61a66 26 API calls 28726 d6b120 28725->28726 28727 d61a66 26 API calls 28726->28727 28728 d6b128 28727->28728 28729 d856f6 28 API calls 28728->28729 28730 d6b13f 28729->28730 28782 d7a599 28730->28782 28732 d6b172 28733 d85787 5 API calls 28732->28733 28734 d6b179 28733->28734 28735 d6b3e1 28734->28735 28736 d6b3ed __EH_prolog3_GS 28735->28736 28737 d6b478 28736->28737 28740 d6b484 28736->28740 28822 d6f711 28736->28822 28738 d61a66 26 API calls 28737->28738 28738->28740 28742 d6b4e0 28740->28742 28789 d6bc65 28740->28789 28741 d85787 5 API calls 28744 d6b543 28741->28744 28745 d6b529 28742->28745 28829 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28742->28829 28747 d6b194 28744->28747 28745->28741 29487 d6d6bc 28747->29487 28750 d6b1d0 28752 d61a66 26 API calls 28750->28752 28753 d6b1e8 28752->28753 28754 d61a66 26 API calls 28753->28754 28755 d6b1f3 28754->28755 28756 d61a66 26 API calls 28755->28756 28757 d6b1fe 28756->28757 29501 d728aa 28757->29501 28759 d6b206 28760 d61a66 26 API calls 28759->28760 28761 d6b20e 28760->28761 28762 d61a66 26 API calls 28761->28762 28763 d6b216 28762->28763 28764 d6d869 26 API calls 28763->28764 28765 d6b21d 28764->28765 28765->28406 28767 d61c03 28766->28767 28768 d61bfb 28766->28768 28767->28768 28770 d61c33 28 API calls 28767->28770 28768->28714 28770->28768 28772 d72821 __EH_prolog3 28771->28772 28773 d856f6 28 API calls 28772->28773 28774 d7285f 28773->28774 28775 d856f6 28 API calls 28774->28775 28776 d72883 28775->28776 28776->28722 28778 d625a4 26 API calls 28777->28778 28779 d6b23f 28778->28779 28780 d625a4 26 API calls 28779->28780 28781 d6b118 28780->28781 28781->28725 28783 d7a5a5 __EH_prolog3 28782->28783 28784 d856f6 28 API calls 28783->28784 28785 d7a5bf 28784->28785 28786 d7a5d6 28785->28786 28788 d77445 112 API calls 28785->28788 28786->28732 28788->28786 28790 d6bc80 28789->28790 28830 d620b0 28790->28830 28792 d6bca7 28793 d6bcba 28792->28793 29049 d6e910 28792->29049 28799 d6bcec 28793->28799 28840 d627e0 28793->28840 28796 d6bce8 28796->28799 28864 d62d41 160 API calls __EH_prolog3_GS 28796->28864 29026 d6232c 28799->29026 28802 d6bd14 28804 d6be08 28802->28804 28805 d67673 28 API calls 28802->28805 28865 d6bec2 7 API calls 28804->28865 28807 d6bd36 28805->28807 29053 d71e54 46 API calls 2 library calls 28807->29053 28809 d6f711 53 API calls 28819 d6bd53 28809->28819 28810 d6be76 28810->28799 28866 d652d8 28810->28866 28878 d6bf3d 28810->28878 28811 d6be16 28811->28810 29055 d7864f 91 API calls 28811->29055 28812 d6bde8 28815 d61a66 26 API calls 28812->28815 28817 d6bded 28815->28817 28816 d61a66 26 API calls 28816->28819 28820 d61a66 26 API calls 28817->28820 28819->28809 28819->28812 28819->28816 29054 d71e54 46 API calls 2 library calls 28819->29054 28820->28804 28823 d71a9f 5 API calls 28822->28823 28824 d6f723 28823->28824 28825 d6f74b 28824->28825 29445 d6f826 28824->29445 28825->28736 28828 d6f738 FindClose 28828->28825 28829->28745 28831 d620bc __EH_prolog3 28830->28831 28832 d72815 28 API calls 28831->28832 28833 d620e8 28832->28833 28834 d62193 28833->28834 28835 d856f6 28 API calls 28833->28835 29056 d7026f 28834->29056 28837 d62180 28835->28837 28837->28834 28838 d676e7 30 API calls 28837->28838 28838->28834 28839 d62227 __cftof 28839->28792 28841 d627ec __EH_prolog3 28840->28841 28842 d611dd 28 API calls 28841->28842 28846 d62838 28841->28846 28860 d6298b 28841->28860 28847 d62882 28842->28847 28843 d629a9 29067 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28843->29067 28845 d652d8 133 API calls 28850 d629f4 28845->28850 28846->28843 28848 d629b6 28846->28848 28862 d6e850 111 API calls 28847->28862 28848->28845 28848->28860 28849 d62a3c 28853 d62a6f 28849->28853 28849->28860 29068 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28849->29068 28850->28849 28852 d652d8 133 API calls 28850->28852 28852->28850 28853->28860 28863 d6e850 111 API calls 28853->28863 28854 d62986 28856 d62e8b 26 API calls 28854->28856 28855 d62995 28857 d62e8b 26 API calls 28855->28857 28856->28860 28857->28846 28858 d628ad 28858->28854 28858->28855 28859 d652d8 133 API calls 28861 d62ac0 28859->28861 28860->28796 28861->28859 28861->28860 28862->28858 28863->28861 28864->28802 28865->28811 28867 d652e4 28866->28867 28868 d652e8 28866->28868 28867->28810 28877 d6e850 111 API calls 28868->28877 28869 d652fa 28870 d65315 28869->28870 28871 d65323 28869->28871 28872 d65355 28870->28872 29069 d648aa 118 API calls 2 library calls 28870->29069 29070 d63d9d 131 API calls 3 library calls 28871->29070 28872->28810 28875 d65321 28875->28872 29071 d6344b 89 API calls 28875->29071 28877->28869 28879 d6bf95 28878->28879 28884 d6bfc4 28879->28884 28944 d6c2fd 28879->28944 29169 d7cdb4 135 API calls __EH_prolog3_GS 28879->29169 28881 d6d2e5 28882 d6d331 28881->28882 28883 d6d2ea 28881->28883 28882->28944 29241 d7cdb4 135 API calls __EH_prolog3_GS 28882->29241 28883->28944 29240 d6ab88 185 API calls 28883->29240 28884->28881 28889 d6bfeb 28884->28889 28884->28944 28885 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 28886 d6d327 28885->28886 28886->28810 28889->28944 29072 d67e1b 28889->29072 28891 d6c0c8 29084 d7106b 28891->29084 28895 d6c151 28899 d6c16f 28895->28899 29171 d72095 45 API calls __EH_prolog3_GS 28895->29171 28897 d6c269 28903 d6c29b 28897->28903 29172 d619a9 26 API calls 28897->29172 28898 d6d205 28902 d6c948 28898->28902 28939 d6c743 28898->28939 28925 d6c239 28899->28925 29174 d70ddb 28 API calls 28899->29174 28901 d6c374 28901->28898 28904 d6c3cf 28901->28904 28905 d6c3ea 28901->28905 28915 d6c97a 28902->28915 29207 d619a9 26 API calls 28902->29207 28903->28944 29173 d619a9 26 API calls 28903->29173 28909 d61a66 26 API calls 28904->28909 28920 d6c409 28905->28920 29176 d6b92d 56 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28905->29176 28913 d6c3da 28909->28913 28910 d6d276 28910->28944 29239 d619a9 26 API calls 28910->29239 28917 d61a66 26 API calls 28913->28917 28915->28944 29208 d619a9 26 API calls 28915->29208 28917->28944 28918 d6c33d _wcslen 29175 d6f103 52 API calls 2 library calls 28918->29175 28919 d6c4ea 29094 d6b2ee 28919->29094 28920->28919 28921 d6f711 53 API calls 28920->28921 28932 d6c49b 28921->28932 28925->28897 28925->28901 28926 d6c5c2 28927 d6c7d8 28926->28927 28931 d6c5cf 28926->28931 29185 d72a36 115 API calls 28927->29185 28929 d61a66 26 API calls 28929->28919 28964 d6c62c 28931->28964 29179 d657c0 28 API calls 2 library calls 28931->29179 28932->28929 28934 d6c501 28940 d6c551 28934->28940 29177 d619a9 26 API calls 28934->29177 28937 d6c8f0 28945 d6c9eb 28937->28945 28958 d6c8ff 28937->28958 28938 d6c830 28938->28937 28947 d6c859 28938->28947 28939->28910 29238 d619a9 26 API calls 28939->29238 28940->28944 29178 d619a9 26 API calls 28940->29178 28944->28885 28960 d6c874 28945->28960 29100 d6b345 28945->29100 28946 d6c940 28948 d6ddc7 114 API calls 28946->28948 28951 d6ed0d 49 API calls 28947->28951 28953 d6ca64 28947->28953 28947->28960 28948->28902 28950 d6d1f2 28954 d6ddc7 114 API calls 28950->28954 28955 d6c8b3 28951->28955 28952 d6ca01 28956 d6ca05 28952->28956 29106 d6b778 28952->29106 28953->28950 28978 d6cac5 28953->28978 29209 d6e152 28953->29209 28954->28898 28955->28960 29187 d6d8b8 28955->29187 28961 d6ddc7 114 API calls 28956->28961 28958->28946 29206 d6b544 144 API calls __EH_prolog3_GS 28958->29206 28960->28953 28960->28956 28967 d6b345 90 API calls 28960->28967 28961->28939 28963 d6cb15 28970 d6fd70 28 API calls 28963->28970 28964->28939 28965 d6c77a 28964->28965 28974 d6c781 28964->28974 29180 d6b015 28 API calls 28964->29180 29181 d72a36 115 API calls 28964->29181 29182 d632d2 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28964->29182 29183 d6b8ed 89 API calls 28964->29183 29184 d632d2 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28965->29184 28972 d6ca5e 28967->28972 28992 d6cb2f 28970->28992 28972->28953 28972->28956 28974->28938 29186 d6ede9 119 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28974->29186 28976 d6cab7 29213 d69653 109 API calls 28976->29213 29136 d6fd70 28978->29136 28979 d6cc76 28982 d6cd33 28979->28982 28983 d6cc94 28979->28983 28980 d6cf27 28984 d6cf50 28980->28984 28985 d6cf39 28980->28985 29009 d6ccb5 28980->29009 28981 d6cc21 28981->28979 28981->28980 29217 d722b9 28 API calls 28982->29217 28987 d6ccd8 28983->28987 28995 d6cca3 28983->28995 29140 d79625 28984->29140 29224 d6d771 28985->29224 28987->29009 29216 d6a7a2 142 API calls 28987->29216 28990 d6cd69 28993 d7106b 45 API calls 28990->28993 28991 d6cf73 29156 d794ea 28991->29156 28992->28981 29214 d6e39d 8 API calls 28992->29214 28999 d6cd76 28993->28999 29215 d632d2 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28995->29215 29218 d6b92d 56 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 28999->29218 29002 d6cdaf 29003 d6cddd 29002->29003 29004 d6cddf 29002->29004 29005 d6cdcd 29002->29005 29010 d6ce3e 29003->29010 29221 d619a9 26 API calls 29003->29221 29220 d6d3d7 135 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29004->29220 29219 d6a496 119 API calls 29005->29219 29012 d6cf15 29009->29012 29223 d6fd28 5 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29009->29223 29010->29009 29222 d619a9 26 API calls 29010->29222 29015 d6d044 29012->29015 29235 d632d2 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29012->29235 29014 d6d115 29164 d6e772 29014->29164 29015->28950 29015->29014 29019 d6d161 29015->29019 29163 d6e8d9 SetEndOfFile 29015->29163 29018 d6d159 29020 d6de50 110 API calls 29018->29020 29019->28950 29021 d6f58b 49 API calls 29019->29021 29020->29019 29022 d6d1d2 29021->29022 29022->28950 29236 d632d2 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29022->29236 29024 d6d1e8 29237 d69500 109 API calls __EH_prolog3_GS 29024->29237 29027 d62350 29026->29027 29028 d6233e 29026->29028 29029 d61a66 26 API calls 29027->29029 29028->29027 29441 d623b0 26 API calls 29028->29441 29030 d62369 29029->29030 29442 d62ed0 26 API calls 29030->29442 29033 d62374 29443 d624d9 26 API calls 29033->29443 29050 d6e927 29049->29050 29051 d6e931 29050->29051 29444 d693d7 110 API calls __EH_prolog3_GS 29050->29444 29051->28793 29053->28819 29054->28819 29055->28810 29057 d7028f __cftof 29056->29057 29064 d70152 29057->29064 29060 d61a66 26 API calls 29061 d702b4 29060->29061 29062 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29061->29062 29063 d702bf 29062->29063 29063->28839 29065 d625a4 26 API calls 29064->29065 29066 d701c7 29065->29066 29066->29060 29067->28860 29068->28853 29069->28875 29070->28875 29071->28872 29073 d67e27 __EH_prolog3_GS 29072->29073 29242 d67bfc 29073->29242 29075 d67e6c 29076 d85787 5 API calls 29075->29076 29077 d67ecf 29076->29077 29077->28891 29078 d67e68 29078->29075 29081 d67ed2 29078->29081 29082 d67ebe 29078->29082 29247 d67bd6 30 API calls 29078->29247 29080 d61a66 26 API calls 29080->29075 29081->29082 29248 d6adaa CompareStringW 29081->29248 29082->29080 29093 d71095 29084->29093 29085 d71256 29086 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29085->29086 29088 d6c11b 29086->29088 29087 d6769f 45 API calls 29089 d71241 29087->29089 29088->28899 29170 d72095 45 API calls __EH_prolog3_GS 29088->29170 29090 d625a4 26 API calls 29089->29090 29091 d7124d 29090->29091 29092 d61a66 26 API calls 29091->29092 29092->29085 29093->29085 29093->29087 29095 d6b303 29094->29095 29096 d6b33b 29095->29096 29290 d69635 89 API calls 29095->29290 29096->28926 29096->28934 29098 d6b333 29291 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29098->29291 29101 d6b368 29100->29101 29105 d6b39e 29100->29105 29101->29105 29292 d785fd 75 API calls 29101->29292 29103 d6b39a 29103->29105 29293 d632a1 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29103->29293 29105->28952 29107 d6b784 __EH_prolog3_GS 29106->29107 29108 d6b8e3 29107->29108 29110 d6d8b8 138 API calls 29107->29110 29109 d85787 5 API calls 29108->29109 29111 d6b8ea 29109->29111 29112 d6b7ef 29110->29112 29111->28960 29112->29108 29294 d69283 109 API calls 29112->29294 29114 d6b817 29115 d6ed0d 49 API calls 29114->29115 29116 d6b81d 29115->29116 29117 d6b838 29116->29117 29295 d6ed1f 29116->29295 29308 d71a27 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 29117->29308 29120 d6b83e 29120->29108 29309 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29120->29309 29122 d6b827 29122->29117 29307 d632a1 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29122->29307 29123 d6b850 29124 d67673 28 API calls 29123->29124 29126 d6b859 29124->29126 29127 d6b88d 29126->29127 29310 d6ede9 119 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29126->29310 29128 d6eaf3 54 API calls 29127->29128 29132 d6b8c9 29127->29132 29130 d6b8a1 29128->29130 29131 d6d8b8 138 API calls 29130->29131 29133 d6b8c5 29131->29133 29134 d61a66 26 API calls 29132->29134 29133->29132 29311 d69283 109 API calls 29133->29311 29134->29108 29137 d6fd7e 29136->29137 29139 d6fd88 29136->29139 29138 d856f6 28 API calls 29137->29138 29138->29139 29139->28963 29141 d79639 29140->29141 29142 d7975f 29141->29142 29144 d79644 29141->29144 29143 d8734a _com_raise_error RaiseException 29142->29143 29146 d7970b 29143->29146 29145 d796ed 29144->29145 29144->29146 29147 d8d08c ___std_exception_copy 21 API calls 29144->29147 29150 d79739 29144->29150 29145->29146 29149 d7971f 29145->29149 29145->29150 29148 d8734a _com_raise_error RaiseException 29146->29148 29147->29145 29154 d797a3 __EH_prolog3 __cftof 29148->29154 29149->29150 29313 d79556 89 API calls 4 library calls 29149->29313 29150->28991 29152 d79896 29152->28991 29153 d8d08c ___std_exception_copy 21 API calls 29153->29154 29154->29152 29154->29153 29314 d69384 89 API calls 29154->29314 29158 d794f3 29156->29158 29157 d7951f 29330 d7abc8 155 API calls 29157->29330 29158->29157 29159 d7951d 29158->29159 29160 d79515 29158->29160 29159->29009 29315 d7b76f 29160->29315 29163->29014 29165 d6e783 29164->29165 29167 d6e792 29164->29167 29166 d6e789 FlushFileBuffers 29165->29166 29165->29167 29166->29167 29168 d6e80f SetFileTime 29167->29168 29168->29018 29169->28884 29170->28895 29171->28899 29172->28903 29173->28944 29174->28918 29175->28925 29176->28920 29177->28940 29178->28944 29179->28964 29180->28964 29181->28964 29182->28964 29183->28964 29184->28974 29185->28974 29186->28938 29188 d6d8c5 29187->29188 29189 d6ed0d 49 API calls 29188->29189 29198 d6d8d7 29189->29198 29190 d6d93e 29191 d6de9a 49 API calls 29190->29191 29195 d6d953 29190->29195 29191->29195 29194 d6eaf3 54 API calls 29197 d6d973 29194->29197 29195->29194 29204 d6d957 29195->29204 29196 d6d8e8 29196->29198 29409 d6d990 125 API calls __EH_prolog3_GS 29196->29409 29199 d6d977 29197->29199 29200 d6d982 29197->29200 29198->29190 29198->29196 29202 d6ed0d 49 API calls 29198->29202 29198->29204 29410 d7846c 61 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29198->29410 29411 d692e6 RaiseException _com_raise_error 29198->29411 29201 d6de9a 49 API calls 29199->29201 29203 d6ec63 49 API calls 29200->29203 29201->29204 29202->29198 29203->29204 29204->28960 29206->28946 29207->28915 29208->28944 29210 d6e15b GetFileType 29209->29210 29211 d6caa5 29209->29211 29210->29211 29211->28978 29212 d632d2 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29211->29212 29212->28976 29213->28978 29214->28981 29215->29009 29216->29009 29217->28990 29218->29002 29219->29003 29220->29003 29221->29010 29222->29009 29223->29012 29225 d6d77d __EH_prolog3 29224->29225 29226 d611dd 28 API calls 29225->29226 29227 d6d788 29226->29227 29228 d72af9 150 API calls 29227->29228 29234 d6d7b1 29228->29234 29229 d6d804 29231 d6d828 29229->29231 29420 d619a9 26 API calls 29229->29420 29231->29009 29233 d72af9 150 API calls 29233->29234 29234->29229 29234->29233 29412 d72ce5 29234->29412 29235->29015 29236->29024 29237->28950 29238->28910 29239->28944 29240->28944 29241->28944 29249 d6790e 29242->29249 29244 d67c1d 29244->29078 29246 d6790e 47 API calls 29246->29244 29247->29078 29248->29082 29250 d7106b 45 API calls 29249->29250 29267 d67989 _wcslen 29250->29267 29251 d67b1b 29255 d67b4a 29251->29255 29280 d619a9 26 API calls 29251->29280 29252 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29254 d67bbb 29252->29254 29254->29244 29254->29246 29257 d67b92 29255->29257 29281 d619a9 26 API calls 29255->29281 29257->29252 29259 d67673 28 API calls 29259->29267 29261 d7106b 45 API calls 29261->29267 29262 d6769f 45 API calls 29262->29267 29263 d61a66 26 API calls 29263->29267 29265 d67bc2 29266 d61a66 26 API calls 29265->29266 29268 d67bc7 29266->29268 29267->29251 29267->29259 29267->29261 29267->29262 29267->29263 29267->29265 29270 d61b63 28 API calls 29267->29270 29271 d72117 29267->29271 29275 d71a9f 29267->29275 29279 d67bd6 30 API calls 29267->29279 29269 d61a66 26 API calls 29268->29269 29269->29251 29270->29267 29272 d72124 29271->29272 29273 d6769f 45 API calls 29272->29273 29274 d72136 29273->29274 29274->29267 29276 d71ab1 29275->29276 29282 d696e5 29276->29282 29279->29267 29280->29255 29281->29257 29283 d696f1 _wcslen 29282->29283 29286 d690f4 29283->29286 29289 d69137 __cftof 29286->29289 29287 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29288 d691a9 29287->29288 29288->29267 29289->29287 29290->29098 29291->29096 29292->29103 29293->29105 29294->29114 29296 d6ed2b __EH_prolog3_GS 29295->29296 29297 d6ed38 GetFileAttributesW 29296->29297 29298 d6ed46 29297->29298 29306 d6edad 29297->29306 29300 d7169a 47 API calls 29298->29300 29299 d85787 5 API calls 29301 d6edc3 29299->29301 29302 d6ed68 29300->29302 29301->29122 29303 d6ed81 29302->29303 29304 d6ed78 GetFileAttributesW 29302->29304 29303->29306 29312 d619a9 26 API calls 29303->29312 29304->29303 29306->29299 29307->29117 29308->29120 29309->29123 29310->29127 29311->29132 29312->29306 29313->29150 29314->29154 29331 d797a4 29315->29331 29317 d7b78e __InternalCxxFrameHandler 29317->29317 29319 d7bb9c 29317->29319 29336 d72af9 29317->29336 29347 d77590 29317->29347 29353 d7a008 150 API calls 29317->29353 29354 d7bc05 150 API calls 29317->29354 29355 d777cf 29317->29355 29359 d79a2b 129 API calls 29317->29359 29360 d7c27f 155 API calls 29317->29360 29361 d7a814 129 API calls __InternalCxxFrameHandler 29319->29361 29321 d7bbb5 __InternalCxxFrameHandler 29322 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29321->29322 29323 d7bbfc 29322->29323 29323->29159 29330->29159 29333 d797b0 __EH_prolog3 __cftof 29331->29333 29332 d79896 29332->29317 29333->29332 29334 d8d08c ___std_exception_copy 21 API calls 29333->29334 29362 d69384 89 API calls 29333->29362 29334->29333 29344 d72b0f __InternalCxxFrameHandler 29336->29344 29337 d72c7f 29338 d72cb3 29337->29338 29363 d72ab0 29337->29363 29340 d72cd4 29338->29340 29369 d682a0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 29338->29369 29370 d773f8 29340->29370 29344->29337 29345 d72c76 29344->29345 29367 d6fe6f 123 API calls __EH_prolog3 29344->29367 29368 d7cdb4 135 API calls __EH_prolog3_GS 29344->29368 29345->29317 29348 d775a1 29347->29348 29349 d7759c 29347->29349 29351 d775b1 29348->29351 29352 d777cf 113 API calls 29348->29352 29386 d77628 29349->29386 29351->29317 29352->29351 29353->29317 29354->29317 29356 d77806 29355->29356 29357 d777db ResetEvent ReleaseSemaphore 29355->29357 29356->29317 29401 d775ed WaitForSingleObject 29357->29401 29359->29317 29360->29317 29361->29321 29362->29333 29364 d72af5 29363->29364 29365 d72ab8 29363->29365 29364->29338 29365->29364 29376 d78618 29365->29376 29367->29344 29368->29344 29369->29340 29371 d773ff 29370->29371 29372 d7741a 29371->29372 29384 d692e6 RaiseException _com_raise_error 29371->29384 29374 d7742b SetThreadExecutionState 29372->29374 29385 d692e6 RaiseException _com_raise_error 29372->29385 29374->29345 29379 d84231 29376->29379 29380 d760d5 29379->29380 29381 d84248 SendDlgItemMessageW 29380->29381 29382 d80678 PeekMessageW GetMessageW IsDialogMessageW TranslateMessage DispatchMessageW 29381->29382 29383 d78638 29382->29383 29383->29364 29384->29372 29385->29374 29387 d776a1 29386->29387 29391 d77633 29386->29391 29387->29348 29388 d77638 CreateThread 29388->29391 29397 d77760 29388->29397 29390 d77690 SetThreadPriority 29390->29391 29391->29387 29391->29388 29391->29390 29394 d692eb 109 API calls __EH_prolog3_GS 29391->29394 29395 d69500 109 API calls __EH_prolog3_GS 29391->29395 29396 d692e6 RaiseException _com_raise_error 29391->29396 29394->29391 29395->29391 29396->29391 29400 d7776e 116 API calls 29397->29400 29399 d77769 29400->29399 29402 d77624 29401->29402 29403 d775fe GetLastError 29401->29403 29402->29356 29407 d692eb 109 API calls __EH_prolog3_GS 29403->29407 29405 d77618 29408 d692e6 RaiseException _com_raise_error 29405->29408 29407->29405 29408->29402 29409->29196 29410->29198 29411->29198 29413 d72cfe __InternalCxxFrameHandler 29412->29413 29414 d72d18 29412->29414 29416 d72d42 29413->29416 29438 d6fe6f 123 API calls __EH_prolog3 29413->29438 29414->29413 29421 d6e948 29414->29421 29418 d773f8 2 API calls 29416->29418 29419 d72d47 29418->29419 29419->29234 29420->29231 29422 d6e954 __EH_prolog3_GS 29421->29422 29423 d6e963 29422->29423 29424 d6e976 GetStdHandle 29422->29424 29436 d6e988 29422->29436 29425 d85787 5 API calls 29423->29425 29424->29436 29427 d6eaab 29425->29427 29426 d6e9df WriteFile 29426->29436 29427->29413 29428 d6e9af WriteFile 29429 d6e9ad 29428->29429 29428->29436 29429->29428 29429->29436 29431 d6ea77 29432 d614a7 28 API calls 29431->29432 29433 d6ea84 29432->29433 29440 d69653 109 API calls 29433->29440 29435 d6ea97 29437 d61a66 26 API calls 29435->29437 29436->29423 29436->29426 29436->29428 29436->29429 29436->29431 29439 d69230 111 API calls 29436->29439 29437->29423 29438->29416 29439->29436 29440->29435 29442->29033 29444->29051 29446 d6f835 __EH_prolog3_GS 29445->29446 29447 d6f847 FindFirstFileW 29446->29447 29448 d6f925 FindNextFileW 29446->29448 29451 d6f948 29447->29451 29452 d6f86a 29447->29452 29450 d6f937 GetLastError 29448->29450 29448->29451 29468 d6f90d 29450->29468 29454 d614a7 28 API calls 29451->29454 29453 d7169a 47 API calls 29452->29453 29455 d6f88c 29453->29455 29458 d6f95f 29454->29458 29459 d6f8ac 29455->29459 29461 d6f89c FindFirstFileW 29455->29461 29462 d6f899 29455->29462 29456 d85787 5 API calls 29457 d6f733 29456->29457 29457->28825 29457->28828 29470 d7229d 29458->29470 29467 d6f8e8 29459->29467 29469 d619a9 26 API calls 29459->29469 29461->29459 29462->29461 29464 d6f902 GetLastError 29464->29468 29466 d61a66 26 API calls 29466->29468 29467->29451 29467->29464 29468->29456 29469->29467 29471 d722a6 29470->29471 29474 d7236c 29471->29474 29475 d72378 29474->29475 29478 d7238e 29475->29478 29477 d6f970 29477->29466 29479 d724e5 29478->29479 29480 d723a4 29478->29480 29486 d658cb 45 API calls 29479->29486 29484 d723bc 29480->29484 29485 d70c7f 28 API calls 29480->29485 29484->29477 29485->29484 29488 d6d6e5 29487->29488 29489 d6d70b 29487->29489 29488->29489 29491 d6ec63 49 API calls 29488->29491 29523 d6d89e 29489->29523 29491->29488 29493 d6b231 26 API calls 29494 d6d74c 29493->29494 29495 d61a66 26 API calls 29494->29495 29496 d6d755 29495->29496 29497 d61a66 26 API calls 29496->29497 29498 d6d75e 29497->29498 29499 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29498->29499 29500 d6b1bf 29499->29500 29500->28750 29507 d7909b 29500->29507 29502 d728bb 29501->29502 29528 d6fb8e 29502->29528 29504 d728ed 29505 d6fb8e 118 API calls 29504->29505 29506 d728f8 29505->29506 29508 d790aa 29507->29508 29509 d774ec 118 API calls 29508->29509 29510 d790b9 29508->29510 29509->29510 29539 d74264 26 API calls 29510->29539 29512 d790e8 29540 d74264 26 API calls 29512->29540 29514 d790f3 29541 d74264 26 API calls 29514->29541 29516 d790fe 29542 d74288 26 API calls 29516->29542 29518 d79132 29519 d62e8b 26 API calls 29518->29519 29520 d7913a 29519->29520 29521 d62e8b 26 API calls 29520->29521 29522 d79142 29521->29522 29524 d6d714 29523->29524 29525 d6d8a8 29523->29525 29524->29493 29527 d6ae77 26 API calls 29525->29527 29527->29524 29529 d6fbbb 29528->29529 29531 d6fbc2 29528->29531 29532 d774ec 29529->29532 29531->29504 29533 d777cf 113 API calls 29532->29533 29534 d77518 ReleaseSemaphore 29533->29534 29535 d77556 DeleteCriticalSection CloseHandle CloseHandle 29534->29535 29536 d77538 29534->29536 29535->29531 29537 d775ed 111 API calls 29536->29537 29538 d77542 CloseHandle 29537->29538 29538->29535 29538->29536 29539->29512 29540->29514 29541->29516 29542->29518 29552 d7eac4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 29543->29552 29545 d7eaad 29546 d7eab9 29545->29546 29553 d7eae5 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 29545->29553 29546->28411 29546->28412 29548->28417 29549->28423 29550->28423 29551->28426 29552->29545 29553->29546 29554->28429 29555->28432 29556->28442 29558 d6e910 110 API calls 29557->29558 29559 d62dc7 29558->29559 29560 d62de4 29559->29560 29561 d627e0 133 API calls 29559->29561 29560->28453 29560->28454 29562 d62dd4 29561->29562 29562->29560 29568 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29562->29568 29565 d62797 29564->29565 29566 d6279b 29564->29566 29565->28459 29569 d626d2 29566->29569 29568->29560 29570 d626e4 29569->29570 29571 d62721 29569->29571 29572 d652d8 133 API calls 29570->29572 29577 d65767 29571->29577 29575 d62704 29572->29575 29575->29565 29581 d65770 29577->29581 29578 d652d8 133 API calls 29578->29581 29579 d62742 29579->29575 29582 d62c30 29579->29582 29580 d773f8 2 API calls 29580->29581 29581->29578 29581->29579 29581->29580 29583 d62c3c __EH_prolog3_GS 29582->29583 29604 d65365 29583->29604 29585 d62c8f 29592 d62d02 29585->29592 29640 d619a9 26 API calls 29585->29640 29586 d85787 5 API calls 29588 d62d18 29586->29588 29587 d62c5a 29587->29585 29589 d62c86 29587->29589 29590 d62c91 29587->29590 29588->29575 29636 d7888c 28 API calls 29589->29636 29594 d62c9a 29590->29594 29595 d62cb9 29590->29595 29592->29586 29637 d7880e 28 API calls __EH_prolog3 29594->29637 29638 d78707 29 API calls 2 library calls 29595->29638 29597 d62ca7 29599 d625a4 26 API calls 29597->29599 29601 d62caf 29599->29601 29600 d62cd2 29639 d62ed0 26 API calls 29600->29639 29603 d61a66 26 API calls 29601->29603 29603->29585 29605 d65380 29604->29605 29606 d653ae 29605->29606 29607 d653ca 29605->29607 29641 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29606->29641 29608 d65634 29607->29608 29612 d653f6 29607->29612 29647 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29608->29647 29611 d653b9 29613 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29611->29613 29612->29611 29615 d79625 89 API calls 29612->29615 29614 d65659 29613->29614 29614->29587 29620 d65449 29615->29620 29616 d6547b 29617 d6550d 29616->29617 29635 d65472 29616->29635 29644 d72a36 115 API calls 29616->29644 29621 d6fd70 28 API calls 29617->29621 29618 d65477 29618->29616 29643 d6315d 28 API calls 29618->29643 29619 d65467 29642 d6204b 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29619->29642 29620->29616 29620->29618 29620->29619 29622 d65520 29621->29622 29627 d655b9 29622->29627 29628 d655a9 29622->29628 29624 d7909b 118 API calls 29624->29611 29630 d794ea 155 API calls 29627->29630 29629 d6d771 155 API calls 29628->29629 29631 d655b7 29629->29631 29630->29631 29645 d6fd28 5 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29631->29645 29633 d655f1 29633->29635 29646 d632d2 89 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 29633->29646 29635->29624 29636->29585 29637->29597 29638->29600 29639->29585 29640->29592 29641->29611 29642->29635 29643->29616 29644->29617 29645->29633 29646->29635 29647->29611 29649 d67493 29648->29649 29652 d67441 29648->29652 29658 d61a92 28 API calls std::_Xinvalid_argument 29649->29658 29656 d6744c 29652->29656 29657 d612d3 28 API calls Concurrency::cancel_current_task 29652->29657 29654 d67471 29655 d611b8 28 API calls 29654->29655 29655->29656 29656->28488 29657->29654 29659 d86452 29660 d8645e ___scrt_is_nonwritable_in_current_image 29659->29660 29691 d85e63 29660->29691 29662 d86465 29663 d865b8 29662->29663 29667 d8648f 29662->29667 29794 d86878 4 API calls 2 library calls 29663->29794 29665 d865bf 29787 d8ee14 29665->29787 29679 d864ce ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 29667->29679 29702 d8f9ad 29667->29702 29673 d864ae 29675 d8652f 29710 d86993 GetStartupInfoW __cftof 29675->29710 29677 d86535 29711 d8f8fe 51 API calls 29677->29711 29679->29675 29790 d8e9b0 38 API calls _abort 29679->29790 29681 d8653d 29712 d8454a 29681->29712 29685 d86551 29685->29665 29686 d86555 29685->29686 29687 d8655e 29686->29687 29792 d8edb7 28 API calls _abort 29686->29792 29793 d85fd4 12 API calls ___scrt_uninitialize_crt 29687->29793 29690 d86566 29690->29673 29692 d85e6c 29691->29692 29796 d86694 IsProcessorFeaturePresent 29692->29796 29694 d85e78 29797 d896d9 10 API calls 2 library calls 29694->29797 29696 d85e7d 29701 d85e81 29696->29701 29798 d8f837 29696->29798 29698 d85e98 29698->29662 29701->29662 29705 d8f9c4 29702->29705 29703 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29704 d864a8 29703->29704 29704->29673 29706 d8f951 29704->29706 29705->29703 29708 d8f980 29706->29708 29707 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29709 d8f9a9 29707->29709 29708->29707 29709->29679 29710->29677 29711->29681 29865 d76d7b 29712->29865 29715 d71309 30 API calls 29716 d84572 29715->29716 29947 d7f4d4 29716->29947 29718 d8457b __cftof 29951 d7f89a 29718->29951 29722 d84608 GetCommandLineW 29723 d84618 29722->29723 29724 d846f9 29722->29724 29726 d614a7 28 API calls 29723->29726 29725 d713f9 29 API calls 29724->29725 29727 d84703 29725->29727 29728 d84622 29726->29728 29729 d625a4 26 API calls 29727->29729 29730 d819ee 115 API calls 29728->29730 29731 d84710 29729->29731 29732 d8462c 29730->29732 29733 d61a66 26 API calls 29731->29733 29734 d61a66 26 API calls 29732->29734 29735 d84719 SetEnvironmentVariableW GetLocalTime 29733->29735 29736 d84635 29734->29736 29740 d6f6ba _swprintf 51 API calls 29735->29740 29738 d846dc 29736->29738 29739 d84642 OpenFileMappingW 29736->29739 29741 d614a7 28 API calls 29738->29741 29742 d8465b MapViewOfFile 29739->29742 29743 d846d2 CloseHandle 29739->29743 29744 d8477e SetEnvironmentVariableW GetModuleHandleW LoadIconW 29740->29744 29745 d846e6 29741->29745 29742->29743 29746 d8466b UnmapViewOfFile MapViewOfFile 29742->29746 29743->29724 29748 d807e5 34 API calls 29744->29748 29749 d83efc 30 API calls 29745->29749 29746->29743 29747 d84689 29746->29747 29751 d7fc38 28 API calls 29747->29751 29752 d847bc 29748->29752 29750 d846f0 29749->29750 29753 d61a66 26 API calls 29750->29753 29754 d84699 29751->29754 29755 d73538 133 API calls 29752->29755 29753->29724 29757 d83efc 30 API calls 29754->29757 29756 d847cc 29755->29756 29758 d7d255 28 API calls 29756->29758 29759 d846a2 29757->29759 29760 d847d8 29758->29760 29761 d75109 114 API calls 29759->29761 29762 d7d255 28 API calls 29760->29762 29763 d846b5 29761->29763 29764 d847e1 DialogBoxParamW 29762->29764 29765 d751bf 114 API calls 29763->29765 29766 d7d347 26 API calls 29764->29766 29767 d846c0 29765->29767 29768 d8481e 29766->29768 29770 d846cb UnmapViewOfFile 29767->29770 29769 d7d347 26 API calls 29768->29769 29771 d8482a 29769->29771 29770->29743 29772 d8483a 29771->29772 29773 d84833 Sleep 29771->29773 29774 d84848 29772->29774 29775 d7fb4b 48 API calls 29772->29775 29773->29772 29776 d84852 DeleteObject 29774->29776 29775->29774 29777 d84867 DeleteObject 29776->29777 29778 d8486e 29776->29778 29777->29778 29779 d8489e 29778->29779 29780 d848b0 29778->29780 29781 d83fcf 6 API calls 29779->29781 29782 d7f53a GdiplusShutdown CoUninitialize 29780->29782 29783 d848a4 CloseHandle 29781->29783 29784 d848ea 29782->29784 29783->29780 29785 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29784->29785 29786 d848fd 29785->29786 29791 d869c9 GetModuleHandleW 29786->29791 30017 d8eb91 29787->30017 29790->29675 29791->29685 29792->29687 29793->29690 29794->29665 29796->29694 29797->29696 29802 d92d0a 29798->29802 29801 d896f8 7 API calls 2 library calls 29801->29701 29803 d92d27 29802->29803 29806 d92d23 29802->29806 29803->29806 29808 d91320 29803->29808 29804 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29805 d85e8a 29804->29805 29805->29698 29805->29801 29806->29804 29809 d9132c ___scrt_is_nonwritable_in_current_image 29808->29809 29820 d918e1 EnterCriticalSection 29809->29820 29811 d91333 29821 d931d8 29811->29821 29813 d91342 29819 d91351 29813->29819 29834 d911b0 29 API calls 29813->29834 29816 d9134c 29835 d91266 GetStdHandle GetFileType 29816->29835 29817 d91362 _abort 29817->29803 29836 d9136d LeaveCriticalSection _abort 29819->29836 29820->29811 29822 d931e4 ___scrt_is_nonwritable_in_current_image 29821->29822 29823 d93208 29822->29823 29824 d931f1 29822->29824 29837 d918e1 EnterCriticalSection 29823->29837 29845 d901d3 20 API calls _abort 29824->29845 29827 d931f6 29846 d8ac8e 26 API calls _abort 29827->29846 29829 d93240 29847 d93267 LeaveCriticalSection _abort 29829->29847 29830 d93200 _abort 29830->29813 29831 d93214 29831->29829 29838 d93129 29831->29838 29834->29816 29835->29819 29836->29817 29837->29831 29848 d91de6 29838->29848 29840 d93148 29855 d903d4 29840->29855 29842 d9313b 29842->29840 29861 d91bba 11 API calls 2 library calls 29842->29861 29843 d9319a 29843->29831 29845->29827 29846->29830 29847->29830 29853 d91df3 _abort 29848->29853 29849 d91e33 29863 d901d3 20 API calls _abort 29849->29863 29850 d91e1e RtlAllocateHeap 29851 d91e31 29850->29851 29850->29853 29851->29842 29853->29849 29853->29850 29862 d8e91a 7 API calls 2 library calls 29853->29862 29856 d903df RtlFreeHeap 29855->29856 29860 d90408 __dosmaperr 29855->29860 29857 d903f4 29856->29857 29856->29860 29864 d901d3 20 API calls _abort 29857->29864 29859 d903fa GetLastError 29859->29860 29860->29843 29861->29842 29862->29853 29863->29851 29864->29859 29967 d85b20 29865->29967 29868 d76dd3 GetProcAddress 29871 d76de5 29868->29871 29872 d76dfd GetProcAddress 29868->29872 29869 d76e28 29870 d7719b 29869->29870 29998 d8e50e 42 API calls 2 library calls 29869->29998 29875 d713f9 29 API calls 29870->29875 29871->29872 29872->29869 29874 d76e0f 29872->29874 29874->29869 29877 d771a6 29875->29877 29876 d77098 29876->29870 29879 d713f9 29 API calls 29876->29879 29878 d72117 45 API calls 29877->29878 29901 d771ba 29878->29901 29880 d770ac 29879->29880 29881 d770bd CreateFileW 29880->29881 29882 d770ba 29880->29882 29884 d77186 CloseHandle 29881->29884 29885 d770db SetFilePointer 29881->29885 29882->29881 29887 d61a66 26 API calls 29884->29887 29885->29884 29886 d770ed ReadFile 29885->29886 29886->29884 29888 d77109 29886->29888 29889 d77199 29887->29889 29892 d773f2 29888->29892 29893 d7711a 29888->29893 29889->29870 29891 d614a7 28 API calls 29891->29901 30004 d85ce1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 29892->30004 29894 d614a7 28 API calls 29893->29894 29902 d77133 29894->29902 29896 d7229d 45 API calls 29896->29901 29897 d773f7 29898 d771de CompareStringW 29898->29901 29899 d61a66 26 API calls 29899->29901 29901->29891 29901->29896 29901->29898 29901->29899 29903 d6ed1f 49 API calls 29901->29903 29922 d77248 29901->29922 29969 d7067e 29901->29969 29974 d76c5e 29901->29974 29904 d77176 29902->29904 29909 d76c5e 30 API calls 29902->29909 29999 d76366 29902->29999 29903->29901 29908 d61a66 26 API calls 29904->29908 29905 d77292 29906 d7729e 29905->29906 29907 d773bd 29905->29907 30003 d72187 45 API calls 29906->30003 29911 d61a66 26 API calls 29907->29911 29912 d7717e 29908->29912 29909->29902 29915 d773c5 29911->29915 29916 d61a66 26 API calls 29912->29916 29913 d614a7 28 API calls 29913->29922 29914 d772a7 29917 d7067e 6 API calls 29914->29917 29918 d61a66 26 API calls 29915->29918 29916->29884 29920 d772ac 29917->29920 29921 d773cd 29918->29921 29919 d7229d 45 API calls 29919->29922 29924 d772b3 29920->29924 29925 d77332 29920->29925 29926 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29921->29926 29922->29905 29922->29913 29922->29919 29923 d61a66 26 API calls 29922->29923 29931 d6ed1f 49 API calls 29922->29931 29923->29922 29928 d76c5e 30 API calls 29924->29928 29929 d76a25 53 API calls 29925->29929 29927 d773e8 29926->29927 29927->29715 29932 d772bd 29928->29932 29930 d7735b AllocConsole 29929->29930 29934 d77310 29930->29934 29935 d77368 GetCurrentProcessId AttachConsole 29930->29935 29931->29922 29933 d76c5e 30 API calls 29932->29933 29936 d772c7 29933->29936 29940 d773b5 ExitProcess 29934->29940 29937 d77383 29935->29937 29938 d74318 53 API calls 29936->29938 29942 d7738c GetStdHandle WriteConsoleW Sleep FreeConsole 29937->29942 29939 d772ec 29938->29939 29941 d76a25 53 API calls 29939->29941 29943 d772f6 29941->29943 29942->29934 29944 d74318 53 API calls 29943->29944 29945 d77307 29944->29945 29946 d614a7 28 API calls 29945->29946 29946->29934 29948 d76c5e 30 API calls 29947->29948 29949 d7f4e8 OleInitialize 29948->29949 29950 d7f50b GdiplusStartup SHGetMalloc 29949->29950 29950->29718 29952 d625a4 26 API calls 29951->29952 29953 d7f8a8 29952->29953 29954 d625a4 26 API calls 29953->29954 29955 d7f8b4 29954->29955 29956 d625a4 26 API calls 29955->29956 29957 d7f8c0 29956->29957 29958 d625a4 26 API calls 29957->29958 29959 d7f8cc 29958->29959 29960 d7f84c 29959->29960 29961 d61a66 26 API calls 29960->29961 29962 d7f857 29961->29962 29963 d61a66 26 API calls 29962->29963 29964 d7f85f 29963->29964 29965 d61a66 26 API calls 29964->29965 29966 d7f867 29965->29966 29968 d76d8d GetModuleHandleW 29967->29968 29968->29868 29968->29869 29970 d706a4 GetVersionExW 29969->29970 29971 d706d1 29969->29971 29970->29971 29972 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 29971->29972 29973 d706fa 29972->29973 29973->29901 29975 d76c6a __EH_prolog3_GS 29974->29975 29976 d856f6 28 API calls 29975->29976 29977 d76c77 29976->29977 29978 d76c8d GetSystemDirectoryW 29977->29978 29979 d76ca4 29978->29979 29980 d76cab 29978->29980 29983 d76d71 29979->29983 29984 d612a7 26 API calls 29979->29984 29981 d614a7 28 API calls 29980->29981 29982 d76ccd 29981->29982 29986 d614a7 28 API calls 29982->29986 29985 d85787 5 API calls 29983->29985 29984->29983 29987 d76d78 29985->29987 29988 d76cda 29986->29988 29987->29901 30005 d71ad1 29988->30005 29991 d61a66 26 API calls 29992 d76cf7 29991->29992 29993 d61a66 26 API calls 29992->29993 29994 d76cff LoadLibraryW 29993->29994 29994->29979 29996 d76d1c 29994->29996 29996->29979 30015 d619a9 26 API calls 29996->30015 29998->29876 30001 d76380 29999->30001 30000 d763b7 30000->29902 30001->30000 30002 d61b63 28 API calls 30001->30002 30002->30001 30003->29914 30004->29897 30006 d71add __EH_prolog3_GS 30005->30006 30007 d67673 28 API calls 30006->30007 30008 d71aef 30007->30008 30010 d71b0c 30008->30010 30016 d70ddb 28 API calls 30008->30016 30011 d61a66 26 API calls 30010->30011 30012 d71b35 30011->30012 30013 d85787 5 API calls 30012->30013 30014 d71b3a 30013->30014 30014->29991 30015->29979 30016->30010 30018 d8eb9d _abort 30017->30018 30019 d8eba4 30018->30019 30020 d8ebb6 30018->30020 30053 d8eceb GetModuleHandleW 30019->30053 30041 d918e1 EnterCriticalSection 30020->30041 30023 d8eba9 30023->30020 30054 d8ed2f GetModuleHandleExW 30023->30054 30028 d8ec32 30029 d8ec4a 30028->30029 30034 d8f951 _abort 5 API calls 30028->30034 30035 d8f951 _abort 5 API calls 30029->30035 30030 d8ec78 30045 d8ecaa 30030->30045 30031 d8eca4 30063 d98fc0 5 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 30031->30063 30034->30029 30039 d8ec5b 30035->30039 30036 d8ebbd 30036->30028 30036->30039 30062 d8f6a0 20 API calls _abort 30036->30062 30042 d8ec9b 30039->30042 30041->30036 30064 d91931 LeaveCriticalSection 30042->30064 30044 d8ec74 30044->30030 30044->30031 30065 d91d26 30045->30065 30048 d8ecd8 30051 d8ed2f _abort 8 API calls 30048->30051 30049 d8ecb8 GetPEB 30049->30048 30050 d8ecc8 GetCurrentProcess TerminateProcess 30049->30050 30050->30048 30052 d8ece0 ExitProcess 30051->30052 30053->30023 30055 d8ed59 GetProcAddress 30054->30055 30056 d8ed7c 30054->30056 30059 d8ed6e 30055->30059 30057 d8ed8b 30056->30057 30058 d8ed82 FreeLibrary 30056->30058 30060 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 30057->30060 30058->30057 30059->30056 30061 d8ebb5 30060->30061 30061->30020 30062->30028 30064->30044 30066 d91d4b 30065->30066 30068 d91d41 30065->30068 30072 d91948 5 API calls _abort 30066->30072 30069 d85734 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 30068->30069 30070 d8ecb4 30069->30070 30070->30048 30070->30049 30071 d91d62 30071->30068 30072->30071 30076 d82813 30077 d67673 28 API calls 30076->30077 30084 d82832 _wcslen 30077->30084 30078 d82af7 30140 d658cb 45 API calls 30078->30140 30079 d67673 28 API calls 30080 d82aec 30079->30080 30098 d838a0 30080->30098 30084->30078 30085 d6120c 28 API calls 30084->30085 30089 d82a9a 30084->30089 30086 d828fe 30085->30086 30136 d7645a 28 API calls 30086->30136 30088 d82a01 30092 d82a39 30088->30092 30138 d619a9 26 API calls 30088->30138 30089->30078 30089->30079 30092->30089 30139 d619a9 26 API calls 30092->30139 30093 d614a7 28 API calls 30096 d8292f 30093->30096 30094 d6adaa CompareStringW 30094->30096 30095 d61a66 26 API calls 30095->30096 30096->30088 30096->30093 30096->30094 30096->30095 30137 d7645a 28 API calls 30096->30137 30105 d838ac __cftof __EH_prolog3_GS 30098->30105 30099 d83ba8 30100 d61a66 26 API calls 30099->30100 30101 d83bcf 30100->30101 30102 d85787 5 API calls 30101->30102 30103 d83bd4 30102->30103 30103->30078 30104 d83a1e 30106 d614a7 28 API calls 30104->30106 30105->30099 30105->30104 30147 d78da4 CompareStringW 30105->30147 30108 d83a34 30106->30108 30109 d6ed0d 49 API calls 30108->30109 30110 d83a41 30109->30110 30111 d61a66 26 API calls 30110->30111 30112 d83a4b 30111->30112 30113 d83a9d ShellExecuteExW 30112->30113 30115 d614a7 28 API calls 30112->30115 30114 d83ab2 30113->30114 30120 d83b7c 30113->30120 30117 d83ace IsWindowVisible 30114->30117 30118 d83ae5 WaitForInputIdle 30114->30118 30121 d83b30 CloseHandle 30114->30121 30116 d83a71 30115->30116 30148 d70e49 51 API calls 2 library calls 30116->30148 30117->30118 30122 d83ad9 ShowWindow 30117->30122 30141 d83fcf WaitForSingleObject 30118->30141 30120->30099 30150 d619a9 26 API calls 30120->30150 30126 d83b48 30121->30126 30127 d83b3d 30121->30127 30122->30118 30124 d83a82 30129 d61a66 26 API calls 30124->30129 30126->30120 30133 d83b73 ShowWindow 30126->30133 30149 d78da4 CompareStringW 30127->30149 30128 d83afb 30128->30121 30132 d83b08 GetExitCodeProcess 30128->30132 30131 d83a8e 30129->30131 30131->30113 30132->30121 30134 d83b19 30132->30134 30133->30120 30134->30121 30136->30096 30137->30096 30138->30092 30139->30089 30142 d83fea 30141->30142 30143 d8402f 30141->30143 30144 d83fed PeekMessageW 30142->30144 30143->30128 30145 d83fff GetMessageW TranslateMessage DispatchMessageW 30144->30145 30146 d84020 WaitForSingleObject 30144->30146 30145->30146 30146->30143 30146->30144 30147->30104 30148->30124 30149->30126 30150->30099 30151 d84a07 30152 d84910 30151->30152 30153 d84fce ___delayLoadHelper2@8 17 API calls 30152->30153 30153->30152

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 502 d8454a-d84612 call d76d7b call d71309 call d7f4d4 call d871f0 call d7f89a call d7f84c GetCommandLineW 515 d84618-d8463c call d614a7 call d819ee call d61a66 502->515 516 d846f9-d84722 call d713f9 call d625a4 call d61a66 502->516 531 d846dc-d846eb call d614a7 call d83efc 515->531 532 d84642-d84659 OpenFileMappingW 515->532 529 d84729-d84831 SetEnvironmentVariableW GetLocalTime call d6f6ba SetEnvironmentVariableW GetModuleHandleW LoadIconW call d807e5 call d73538 call d7d255 * 2 DialogBoxParamW call d7d347 * 2 516->529 530 d84724 516->530 566 d8483a-d84841 529->566 567 d84833-d84834 Sleep 529->567 530->529 543 d846f0-d846f4 call d61a66 531->543 535 d8465b-d84669 MapViewOfFile 532->535 536 d846d2-d846da CloseHandle 532->536 535->536 539 d8466b-d84687 UnmapViewOfFile MapViewOfFile 535->539 536->516 539->536 540 d84689-d846cc call d7fc38 call d83efc call d75109 call d751bf call d751f8 UnmapViewOfFile 539->540 540->536 543->516 568 d84848-d84865 call d75041 DeleteObject 566->568 569 d84843 call d7fb4b 566->569 567->566 573 d8486e-d84874 568->573 574 d84867-d84868 DeleteObject 568->574 569->568 575 d8488e-d8489c 573->575 576 d84876-d8487d 573->576 574->573 578 d8489e-d848aa call d83fcf CloseHandle 575->578 579 d848b0-d848bd 575->579 576->575 577 d8487f-d84889 call d694b8 576->577 577->575 578->579 582 d848bf-d848cb 579->582 583 d848e1-d848e5 call d7f53a 579->583 586 d848db-d848dd 582->586 587 d848cd-d848d5 582->587 588 d848ea-d84903 call d85734 583->588 586->583 590 d848df 586->590 587->583 589 d848d7-d848d9 587->589 589->583 590->583
                                            APIs
                                              • Part of subcall function 00D76D7B: GetModuleHandleW.KERNEL32(kernel32,7889FE40), ref: 00D76DC7
                                              • Part of subcall function 00D76D7B: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00D76DD9
                                              • Part of subcall function 00D76D7B: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00D76E03
                                              • Part of subcall function 00D71309: __EH_prolog3.LIBCMT ref: 00D71310
                                              • Part of subcall function 00D71309: GetCurrentDirectoryW.KERNEL32(00000000,00000000,0000000C,00D717FB,?,?,\\?\,7889FE40,?,?,?,00000000,00D9A279,000000FF), ref: 00D71319
                                              • Part of subcall function 00D7F4D4: OleInitialize.OLE32(00000000), ref: 00D7F4ED
                                              • Part of subcall function 00D7F4D4: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00D7F524
                                              • Part of subcall function 00D7F4D4: SHGetMalloc.SHELL32(00DB532C), ref: 00D7F52E
                                            • GetCommandLineW.KERNEL32 ref: 00D84608
                                            • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp,?,00000000), ref: 00D8464F
                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000009,?,00000000), ref: 00D84661
                                            • UnmapViewOfFile.KERNEL32(00000000,?,00000000), ref: 00D8466F
                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,?,?,00000000), ref: 00D8467D
                                              • Part of subcall function 00D7FC38: __EH_prolog3.LIBCMT ref: 00D7FC3F
                                              • Part of subcall function 00D83EFC: __EH_prolog3_GS.LIBCMT ref: 00D83F03
                                              • Part of subcall function 00D83EFC: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?,?,?,?,?,?,00000028), ref: 00D83F1B
                                              • Part of subcall function 00D83EFC: SetEnvironmentVariableW.KERNEL32(sfxpar,?,?,?,?,?,?,?,00000028), ref: 00D83F86
                                              • Part of subcall function 00D751BF: _wcslen.LIBCMT ref: 00D751E3
                                            • UnmapViewOfFile.KERNEL32(00000000,00DB5430,00000400,00DB5430,00DB5430,00000400,00000000,00000001,?,00000000), ref: 00D846CC
                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00D846D3
                                            • SetEnvironmentVariableW.KERNEL32(sfxname,00DA9698,00000000), ref: 00D8472F
                                            • GetLocalTime.KERNEL32(?), ref: 00D8473A
                                            • _swprintf.LIBCMT ref: 00D84779
                                            • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00D8478E
                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00D84795
                                            • LoadIconW.USER32(00000000,00000064), ref: 00D847AC
                                            • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00020900,00000000), ref: 00D84803
                                            • Sleep.KERNELBASE(00001B58), ref: 00D84834
                                            • DeleteObject.GDI32 ref: 00D84858
                                            • DeleteObject.GDI32(00050E00), ref: 00D84868
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                              • Part of subcall function 00D819EE: __EH_prolog3_GS.LIBCMT ref: 00D819F5
                                            • CloseHandle.KERNEL32 ref: 00D848AA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: File$EnvironmentHandleVariableView$AddressCloseDeleteH_prolog3H_prolog3_ModuleObjectProcUnmap_wcslen$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingOpenParamSleepStartupTime_swprintf
                                            • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                            • API String ID: 3142445277-3710569615
                                            • Opcode ID: a63b296346925978ad16415ad18b2d1cb58fea95b77713ea45c29d1f1e280e73
                                            • Instruction ID: 5bf3717a342c924a4d6b68767c11c70ac31aca103a0b515aa3b9acba1b3770b5
                                            • Opcode Fuzzy Hash: a63b296346925978ad16415ad18b2d1cb58fea95b77713ea45c29d1f1e280e73
                                            • Instruction Fuzzy Hash: DB91BC71504744EFD320BF64EC45BABB7E8EB89704F444A19F949D2392EB74A904CB72

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 608 d7ebd3-d7ebf0 FindResourceW 609 d7ebf6-d7ec07 SizeofResource 608->609 610 d7ecec 608->610 609->610 611 d7ec0d-d7ec1c LoadResource 609->611 612 d7ecee-d7ecf2 610->612 611->610 613 d7ec22-d7ec2d LockResource 611->613 613->610 614 d7ec33-d7ec48 GlobalAlloc 613->614 615 d7ece4-d7ecea 614->615 616 d7ec4e-d7ec57 GlobalLock 614->616 615->612 617 d7ecdd-d7ecde GlobalFree 616->617 618 d7ec5d-d7ec7b call d86c70 CreateStreamOnHGlobal 616->618 617->615 621 d7ecd6-d7ecd7 GlobalUnlock 618->621 622 d7ec7d-d7ec9f call d7eb06 618->622 621->617 622->621 627 d7eca1-d7eca9 622->627 628 d7ecc4-d7ecd2 627->628 629 d7ecab-d7ecbf GdipCreateHBITMAPFromBitmap 627->629 628->621 629->628 630 d7ecc1 629->630 630->628
                                            APIs
                                            • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00D80845,00000066), ref: 00D7EBE6
                                            • SizeofResource.KERNEL32(00000000,?,?,?,00D80845,00000066), ref: 00D7EBFD
                                            • LoadResource.KERNEL32(00000000,?,?,?,00D80845,00000066), ref: 00D7EC14
                                            • LockResource.KERNEL32(00000000,?,?,?,00D80845,00000066), ref: 00D7EC23
                                            • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00D80845,00000066), ref: 00D7EC3E
                                            • GlobalLock.KERNEL32(00000000), ref: 00D7EC4F
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00D7EC73
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00D7ECD7
                                              • Part of subcall function 00D7EB06: GdipAlloc.GDIPLUS(00000010), ref: 00D7EB0C
                                            • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00D7ECB8
                                            • GlobalFree.KERNEL32(00000000), ref: 00D7ECDE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                            • String ID: PNG
                                            • API String ID: 211097158-364855578
                                            • Opcode ID: a70a511cdeb92afe54323e09e9cd7a48a27f4c27b1e5a123191c4af050e8887f
                                            • Instruction ID: cf2e04dbb44c77e76c464efd746ecb601d8eaaeb19fa80afd7582591902a1d21
                                            • Opcode Fuzzy Hash: a70a511cdeb92afe54323e09e9cd7a48a27f4c27b1e5a123191c4af050e8887f
                                            • Instruction Fuzzy Hash: 70316975610702ABD7219F21ED4892BBFA9FF89790B08456AF909D2361EB31D800CAB4
                                            APIs
                                              • Part of subcall function 00D78781: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,7889FE40,00000007,?,?,?,00D78751,?,?,?,?,0000000C,00D64426), ref: 00D7879D
                                            • _wcslen.LIBCMT ref: 00D7395A
                                            • __fprintf_l.LIBCMT ref: 00D73AA7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__fprintf_l_wcslen
                                            • String ID: ,$$%s:$*messages***$*messages***$@%s:$RTL
                                            • API String ID: 1796436225-285229759
                                            • Opcode ID: 11a8db173624e93c2511ba400c9bf81f3407783c534d743b6f206b08c19bbc01
                                            • Instruction ID: 18ef28ae65c22178951c7b27c52fc10e001704fe765048eea54fccbc0dc124a8
                                            • Opcode Fuzzy Hash: 11a8db173624e93c2511ba400c9bf81f3407783c534d743b6f206b08c19bbc01
                                            • Instruction Fuzzy Hash: FD52B371900259AFDF24DFA8CC45AEDB7B5FF04310F54852AE909AB281FB719A44DBB0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1006 d6f826-d6f841 call d857d8 1009 d6f847-d6f84d 1006->1009 1010 d6f925-d6f935 FindNextFileW 1006->1010 1011 d6f851-d6f864 FindFirstFileW 1009->1011 1012 d6f84f 1009->1012 1013 d6f937-d6f946 GetLastError 1010->1013 1014 d6f948-d6f9fa call d625c3 call d614a7 call d7229d call d61a66 call d77c44 * 3 1010->1014 1011->1014 1017 d6f86a-d6f88e call d7169a 1011->1017 1012->1011 1015 d6f91d-d6f920 1013->1015 1020 d6f9ff-d6fa0a call d85787 1014->1020 1015->1020 1026 d6f890-d6f897 1017->1026 1027 d6f8ac-d6f8b6 1017->1027 1031 d6f89c-d6f8aa FindFirstFileW 1026->1031 1032 d6f899 1026->1032 1028 d6f8fd-d6f900 1027->1028 1029 d6f8b8-d6f8d3 1027->1029 1028->1014 1036 d6f902-d6f90b GetLastError 1028->1036 1033 d6f8f4-d6f8fc call d85726 1029->1033 1034 d6f8d5-d6f8ee call d619a9 1029->1034 1031->1027 1032->1031 1033->1028 1034->1033 1040 d6f90d-d6f910 1036->1040 1041 d6f91b 1036->1041 1040->1041 1045 d6f912-d6f915 1040->1045 1041->1015 1045->1041 1047 d6f917-d6f919 1045->1047 1047->1015
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6F830
                                            • FindFirstFileW.KERNELBASE(?,?,00000274,00D6F733,000000FF,00000049,00000049,?,?,00D6A684,?,?,00000000,?,?,?), ref: 00D6F859
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049), ref: 00D6F8A4
                                            • GetLastError.KERNEL32(?,?,?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049,?,00000000), ref: 00D6F902
                                            • FindNextFileW.KERNEL32(?,?,00000274,00D6F733,000000FF,00000049,00000049,?,?,00D6A684,?,?,00000000,?,?,?), ref: 00D6F92D
                                            • GetLastError.KERNEL32(?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049,?,00000000), ref: 00D6F93A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FileFind$ErrorFirstLast$H_prolog3_Next
                                            • String ID:
                                            • API String ID: 3831798110-0
                                            • Opcode ID: bc710fa00cc47cc921096f5f34e28787267190b904ad5fa3c32889e504a85b83
                                            • Instruction ID: ca525089f660c40ebb1d861894471635cbf01fe188c81518f7b763081cb9b495
                                            • Opcode Fuzzy Hash: bc710fa00cc47cc921096f5f34e28787267190b904ad5fa3c32889e504a85b83
                                            • Instruction Fuzzy Hash: 5D511F71905619DBCF14DF68D889AEDB7B5FF09320F1442AAE419E3290DB31AA84CF70
                                            APIs
                                            • _wcslen.LIBCMT ref: 00D6C342
                                              • Part of subcall function 00D72095: __EH_prolog3_GS.LIBCMT ref: 00D7209C
                                              • Part of subcall function 00D657C0: __EH_prolog3.LIBCMT ref: 00D657C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3H_prolog3__wcslen
                                            • String ID: __tmp_reference_source_
                                            • API String ID: 1523997010-685763994
                                            • Opcode ID: eebff75d39e6ec49791b1ab237be775d9401c76a2e999d746a365376af8393d2
                                            • Instruction ID: 4ef846645a8e2db33dca99b55f7d05b7e2078a835b081ad0b6f96c47f242ee61
                                            • Opcode Fuzzy Hash: eebff75d39e6ec49791b1ab237be775d9401c76a2e999d746a365376af8393d2
                                            • Instruction Fuzzy Hash: 78D2B170A146899FDF25DFA4C890BFEBBB5FF09304F08451AE49A97241DB34A949CB70
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000000,?,00D8EC80,00000000,00DA6F40,0000000C,00D8EDD7,00000000,00000002,00000000), ref: 00D8ECCB
                                            • TerminateProcess.KERNEL32(00000000,?,00D8EC80,00000000,00DA6F40,0000000C,00D8EDD7,00000000,00000002,00000000), ref: 00D8ECD2
                                            • ExitProcess.KERNEL32 ref: 00D8ECE4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: caa64d1a5a60c8386df4bd78583197e69c6eeaa82eb569bb2defed2cd3d52066
                                            • Instruction ID: 42c73419d5b285630b4cee3e6f5e0d1ee74edeee76024da519334f26c3fcb07f
                                            • Opcode Fuzzy Hash: caa64d1a5a60c8386df4bd78583197e69c6eeaa82eb569bb2defed2cd3d52066
                                            • Instruction Fuzzy Hash: ECE0B632510608AFCF117F55DE09A583B69EF51381F441425F9499A222CB36ED52DB70
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID:
                                            • API String ID: 431132790-0
                                            • Opcode ID: 67efa11fe4762216a2924fade10e7dafd6ba423d16f2fc42a7ae117ff9d539a2
                                            • Instruction ID: 5c12bad67c192415b409a7b86ae95f4a2e4f360a4b23f7bfca7c1e59ef3d253c
                                            • Opcode Fuzzy Hash: 67efa11fe4762216a2924fade10e7dafd6ba423d16f2fc42a7ae117ff9d539a2
                                            • Instruction Fuzzy Hash: D9E192715043448FDB24DF28C884B5ABBE1FF88318F08856EE99D9B346E774E945CB62
                                            APIs
                                            • __EH_prolog3_catch_GS.LIBCMT ref: 00D8090A
                                              • Part of subcall function 00D61E44: GetDlgItem.USER32(00000000,00003021), ref: 00D61E88
                                              • Part of subcall function 00D61E44: SetWindowTextW.USER32(00000000,00D9C6C8), ref: 00D61E9E
                                            • EndDialog.USER32(?,00000000), ref: 00D80A18
                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D80A57
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D80A71
                                            • IsDialogMessageW.USER32(?,?), ref: 00D80A84
                                            • TranslateMessage.USER32(?), ref: 00D80A92
                                            • DispatchMessageW.USER32(?), ref: 00D80A9C
                                            • EndDialog.USER32(?,00000001), ref: 00D80ADE
                                            • GetDlgItem.USER32(?,00000068), ref: 00D80B04
                                            • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00D80B1F
                                            • SendMessageW.USER32(00000000,000000C2,00000000,00D9C6C8), ref: 00D80B32
                                            • SetFocus.USER32(00000000), ref: 00D80B39
                                            • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00D80C20
                                            • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00D80C4C
                                            • GetTickCount.KERNEL32 ref: 00D80C79
                                            • GetLastError.KERNEL32(?,00000011), ref: 00D80CD5
                                            • GetCommandLineW.KERNEL32 ref: 00D80DF9
                                            • _wcslen.LIBCMT ref: 00D80E06
                                            • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,?,winrarsfxmappingfile.tmp,?,00DB5430,00000400,00000001,00000001), ref: 00D80E85
                                            • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 00D80EA3
                                            • ShellExecuteExW.SHELL32(0000003C), ref: 00D80EDC
                                            • WaitForInputIdle.USER32(?,00002710), ref: 00D80F0B
                                            • Sleep.KERNEL32(00000064), ref: 00D80F25
                                            • UnmapViewOfFile.KERNEL32(?,?,?,?,?,?,?,00DB5430,00000400), ref: 00D80F61
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00DB5430,00000400), ref: 00D80F6D
                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D81072
                                              • Part of subcall function 00D61E1F: GetDlgItem.USER32(?,?), ref: 00D61E34
                                              • Part of subcall function 00D61E1F: ShowWindow.USER32(00000000), ref: 00D61E3B
                                            • SetDlgItemTextW.USER32(?,00000065,00D9C6C8), ref: 00D8108A
                                            • GetDlgItem.USER32(?,00000065), ref: 00D81093
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00D810A2
                                            • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_000206D0,00000000,?), ref: 00D81422
                                            • EndDialog.USER32(?,00000001), ref: 00D81436
                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00D810B1
                                              • Part of subcall function 00D7E265: __EH_prolog3_GS.LIBCMT ref: 00D7E26C
                                              • Part of subcall function 00D7E265: ShowWindow.USER32(?,00000000,00000038), ref: 00D7E294
                                              • Part of subcall function 00D7E265: GetWindowRect.USER32(?,?), ref: 00D7E2D8
                                              • Part of subcall function 00D7E265: ShowWindow.USER32(?,00000005,?,00000000), ref: 00D7E373
                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D8114F
                                            • SendMessageW.USER32(?,00000080,00000001,00030431), ref: 00D81284
                                            • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,00050E00), ref: 00D8129D
                                            • GetDlgItem.USER32(?,00000068), ref: 00D812A6
                                            • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00D812BE
                                            • GetDlgItem.USER32(?,00000066), ref: 00D812E6
                                            • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00D8135D
                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D81371
                                            • EnableWindow.USER32(?,00000000), ref: 00D815A7
                                            • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00D815E8
                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00D8160D
                                              • Part of subcall function 00D81D4F: __EH_prolog3_GS.LIBCMT ref: 00D81D59
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Item$Message$TextWindow$Send$Dialog$ErrorFileLastShow$H_prolog3_LongView$CloseCommandCountCreateDispatchEnableExecuteFocusH_prolog3_catch_HandleIdleInputLineMappingParamRectShellSleepTickTranslateUnmapWait_wcslen
                                            • String ID: -el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_$winrarsfxmappingfile.tmp
                                            • API String ID: 3616063595-3000381960
                                            • Opcode ID: b0b56a188c176f5b658fa87ca188f85187791f3398a448a831c55a4d87371242
                                            • Instruction ID: 5e4d0f333e7e987cf10a5fd84a672ccbfd29ff1ec6740a84627ddc69b5dd4d19
                                            • Opcode Fuzzy Hash: b0b56a188c176f5b658fa87ca188f85187791f3398a448a831c55a4d87371242
                                            • Instruction Fuzzy Hash: 0E72BE74944348EFEB21EBA4DC49FEE7BB8EB01700F084159F109B6292D7B45A89CB71

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 379 d76d7b-d76dd1 call d85b20 GetModuleHandleW 382 d76dd3-d76de3 GetProcAddress 379->382 383 d76e28-d7708c 379->383 386 d76de5-d76dfb 382->386 387 d76dfd-d76e0d GetProcAddress 382->387 384 d77092-d7709d call d8e50e 383->384 385 d7719b 383->385 384->385 396 d770a3-d770b8 call d713f9 384->396 388 d7719d-d771be call d713f9 call d72117 385->388 386->387 387->383 390 d76e0f-d76e24 387->390 402 d771c0-d771cc call d7067e 388->402 390->383 403 d770bd-d770d5 CreateFileW 396->403 404 d770ba 396->404 411 d77203-d77234 call d614a7 call d7229d call d61a66 call d6ed1f 402->411 412 d771ce-d771dc call d76c5e 402->412 406 d77186-d77199 CloseHandle call d61a66 403->406 407 d770db-d770e7 SetFilePointer 403->407 404->403 406->388 407->406 409 d770ed-d77107 ReadFile 407->409 409->406 413 d77109-d77114 409->413 443 d77239-d7723c 411->443 412->411 426 d771de-d77201 CompareStringW 412->426 417 d773f2-d773f7 call d85ce1 413->417 418 d7711a-d7714d call d614a7 413->418 428 d77161-d77174 call d76366 418->428 426->411 429 d7723e-d77242 426->429 437 d77176-d77181 call d61a66 * 2 428->437 438 d7714f-d77156 428->438 429->402 432 d77248 429->432 435 d7724c-d77250 432->435 439 d77296-d77298 435->439 440 d77252 435->440 437->406 441 d7715b-d7715c call d76c5e 438->441 442 d77158 438->442 444 d7729e-d772b1 call d72187 call d7067e 439->444 445 d773bd-d773ef call d61a66 * 2 call d85734 439->445 447 d77254-d7728a call d614a7 call d7229d call d61a66 call d6ed1f 440->447 441->428 442->441 443->429 449 d7724a 443->449 465 d772b3-d77330 call d76c5e * 2 call d74318 call d76a25 call d74318 call d614a7 call d7ecf5 call d61549 444->465 466 d77332-d77366 call d76a25 AllocConsole 444->466 481 d77294 447->481 482 d7728c-d77290 447->482 449->435 483 d773b0-d773b7 call d61549 ExitProcess 465->483 476 d773ad 466->476 477 d77368-d773a7 GetCurrentProcessId AttachConsole call d77441 call d77436 GetStdHandle WriteConsoleW Sleep FreeConsole 466->477 476->483 477->476 481->439 482->447 486 d77292 482->486 486->439
                                            APIs
                                            • GetModuleHandleW.KERNEL32(kernel32,7889FE40), ref: 00D76DC7
                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00D76DD9
                                            • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00D76E03
                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00D770CA
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00D770DF
                                            • ReadFile.KERNEL32(00000000,?,00007FFE,?,00000000), ref: 00D770FF
                                            • CloseHandle.KERNEL32(00000000), ref: 00D77187
                                            • CompareStringW.KERNEL32(00000400,00001001,?,000000FF,DXGIDebug.dll,000000FF,?,?,?), ref: 00D771F8
                                            • AllocConsole.KERNEL32 ref: 00D7735E
                                            • GetCurrentProcessId.KERNEL32 ref: 00D77368
                                            • AttachConsole.KERNEL32(00000000), ref: 00D7736F
                                            • GetStdHandle.KERNEL32(000000F4,00000000,00000000,?,00000000), ref: 00D7738F
                                            • WriteConsoleW.KERNEL32(00000000), ref: 00D77396
                                            • Sleep.KERNEL32(00002710), ref: 00D773A1
                                            • FreeConsole.KERNEL32 ref: 00D773A7
                                            • ExitProcess.KERNEL32 ref: 00D773B7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentExitFreeModulePointerReadSleepStringWrite
                                            • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                            • API String ID: 2644799563-3298887752
                                            • Opcode ID: c4325859c3eb6d77d4065e0706e930c232ddd0e462908df01601861afc60db54
                                            • Instruction ID: 231b65cf2cb471b8de92d4e3dda7154d9f51b2a171e94a9e77dc3161bec5786d
                                            • Opcode Fuzzy Hash: c4325859c3eb6d77d4065e0706e930c232ddd0e462908df01601861afc60db54
                                            • Instruction Fuzzy Hash: 0AF139B14042889BCF20EFA4CC49BDE3BAABF05304F548519F91D9B291EB709649CBB5

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00D80678: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D80689
                                              • Part of subcall function 00D80678: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D8069A
                                              • Part of subcall function 00D80678: IsDialogMessageW.USER32(00010444,?), ref: 00D806AE
                                              • Part of subcall function 00D80678: TranslateMessage.USER32(?), ref: 00D806BC
                                              • Part of subcall function 00D80678: DispatchMessageW.USER32(?), ref: 00D806C6
                                            • GetDlgItem.USER32(00000068,00000000), ref: 00D83595
                                            • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,00D7FD20,00000001,?,?), ref: 00D835BA
                                            • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00D835C9
                                            • SendMessageW.USER32(00000000,000000C2,00000000,00D9C6C8), ref: 00D835D7
                                            • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D835F1
                                            • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00D8360B
                                            • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D8364F
                                            • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00D83662
                                            • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00D83675
                                            • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00D8369C
                                            • SendMessageW.USER32(00000000,000000C2,00000000,00D9C860), ref: 00D836AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                            • String ID: \
                                            • API String ID: 3569833718-2967466578
                                            • Opcode ID: afe98d26fe13401ea8217ef7855d416e928b0cfbed4a062395270ec9f45b36c2
                                            • Instruction ID: 773be1950c756b5dc2940aeefeb7af2a5ff986ceba74e1a5346e0c07cf456b9d
                                            • Opcode Fuzzy Hash: afe98d26fe13401ea8217ef7855d416e928b0cfbed4a062395270ec9f45b36c2
                                            • Instruction Fuzzy Hash: 8131C171249700FFE310AF28EC49FAB7BE8EF95741F400619FA51E62A0D76099048BB6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 632 d838a0-d838bc call d857d8 635 d838c2-d838c8 632->635 636 d83bc7-d83bd4 call d61a66 call d85787 632->636 635->636 637 d838ce-d838f4 call d871f0 635->637 643 d838fd-d83909 637->643 644 d838f6 637->644 646 d8390b 643->646 647 d8390d-d83916 643->647 644->643 646->647 648 d83918-d8391b 647->648 649 d83924-d83927 647->649 650 d8391d 648->650 651 d8391f-d83922 648->651 652 d83929 649->652 653 d8392b-d83935 649->653 650->651 651->653 652->653 654 d8393b-d83948 653->654 655 d839ce 653->655 657 d8394a 654->657 658 d8394c-d83956 654->658 656 d839d1-d839d3 655->656 661 d839dc-d839de 656->661 662 d839d5-d839da 656->662 657->658 659 d83958 658->659 660 d8398c-d83999 658->660 663 d8396f-d83972 659->663 666 d8399b 660->666 667 d8399d-d839a7 660->667 664 d839ff-d83a11 call d71383 661->664 665 d839e0-d839e7 661->665 662->661 662->664 668 d8395a-d8395f 663->668 669 d83974 663->669 686 d83a29-d83a64 call d614a7 call d6ed0d call d61a66 664->686 687 d83a13-d83a20 call d78da4 664->687 665->664 670 d839e9-d839f5 665->670 666->667 672 d839ad-d839b2 667->672 673 d83bd7-d83bdd 667->673 674 d83961 668->674 675 d83963-d8396d 668->675 669->660 676 d839fc 670->676 677 d839f7 670->677 681 d839b4 672->681 682 d839b6-d839bc 672->682 678 d83bdf 673->678 679 d83be1-d83be8 673->679 674->675 675->663 683 d83976-d8397b 675->683 676->664 677->676 678->679 684 d83bea-d83bf0 679->684 685 d83c00-d83c06 679->685 681->682 682->673 688 d839c2-d839c5 682->688 691 d8397d 683->691 692 d8397f-d83989 683->692 693 d83bf2 684->693 694 d83bf4-d83bfd 684->694 696 d83c08 685->696 697 d83c0a-d83c14 685->697 705 d83a9d-d83aac ShellExecuteExW 686->705 706 d83a66-d83a95 call d614a7 call d70e49 call d61a66 686->706 687->686 701 d83a22 687->701 688->654 689 d839cb 688->689 689->655 691->692 692->660 693->694 694->685 696->697 697->656 701->686 707 d83b7c-d83b82 705->707 708 d83ab2-d83abc 705->708 742 d83a9a 706->742 743 d83a97 706->743 713 d83b84-d83b99 707->713 714 d83bb7-d83bc3 707->714 710 d83aca-d83acc 708->710 711 d83abe-d83ac0 708->711 716 d83ace-d83ad7 IsWindowVisible 710->716 717 d83ae5-d83af6 WaitForInputIdle call d83fcf 710->717 711->710 715 d83ac2-d83ac8 711->715 719 d83b9b-d83bab call d619a9 713->719 720 d83bae-d83bb6 call d85726 713->720 714->636 715->710 722 d83b30-d83b3b CloseHandle 715->722 716->717 723 d83ad9-d83ae3 ShowWindow 716->723 730 d83afb-d83b02 717->730 719->720 720->714 727 d83b4c-d83b53 722->727 728 d83b3d-d83b4a call d78da4 722->728 723->717 734 d83b6b-d83b6d 727->734 735 d83b55-d83b57 727->735 728->727 728->734 730->722 736 d83b04-d83b06 730->736 734->707 740 d83b6f-d83b71 734->740 735->734 739 d83b59-d83b5f 735->739 736->722 741 d83b08-d83b17 GetExitCodeProcess 736->741 739->734 744 d83b61 739->744 740->707 745 d83b73-d83b76 ShowWindow 740->745 741->722 746 d83b19-d83b22 741->746 742->705 743->742 744->734 745->707 747 d83b29 746->747 748 d83b24 746->748 747->722 748->747
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D838A7
                                            • ShellExecuteExW.SHELL32(?), ref: 00D83AA4
                                            • IsWindowVisible.USER32(?), ref: 00D83ACF
                                            • ShowWindow.USER32(?,00000000), ref: 00D83ADD
                                            • WaitForInputIdle.USER32(?,000007D0), ref: 00D83AED
                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00D83B0F
                                            • CloseHandle.KERNEL32(?), ref: 00D83B33
                                            • ShowWindow.USER32(?,00000001), ref: 00D83B76
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Window$Show$CloseCodeExecuteExitH_prolog3_HandleIdleInputProcessShellVisibleWait
                                            • String ID: .exe$.inf
                                            • API String ID: 3208621885-3750412487
                                            • Opcode ID: 8df61901f85f3ccf760d0458a38e124ff8489d99226ce7d71cb1aa0b005c8b57
                                            • Instruction ID: 51d7a8ac66d4fd3365397610c132703b888c2727172dac7dde1dfe1bdcb55f49
                                            • Opcode Fuzzy Hash: 8df61901f85f3ccf760d0458a38e124ff8489d99226ce7d71cb1aa0b005c8b57
                                            • Instruction Fuzzy Hash: 0EB19A70A00258DFCB25FFA8D9857ED77B5EF44B10F288119E849E7251DBB0AE468B70

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1052 d83efc-d83f11 call d857d8 1055 d83f13 1052->1055 1056 d83f15-d83f45 SetEnvironmentVariableW call d76366 1052->1056 1055->1056 1058 d83f4a-d83f4c 1056->1058 1059 d83f8c-d83f92 1058->1059 1060 d83f4e 1058->1060 1062 d83f94-d83fa9 1059->1062 1063 d83fc7-d83fcc call d85787 1059->1063 1061 d83f51-d83f57 1060->1061 1066 d83f59 1061->1066 1067 d83f5b-d83f67 call d76624 1061->1067 1064 d83fab-d83fbb call d619a9 1062->1064 1065 d83fbe-d83fc6 call d85726 1062->1065 1064->1065 1065->1063 1066->1067 1076 d83f69-d83f70 1067->1076 1077 d83f72-d83f76 1067->1077 1076->1061 1078 d83f78 1077->1078 1079 d83f7a-d83f86 SetEnvironmentVariableW 1077->1079 1078->1079 1079->1059
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D83F03
                                            • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?,?,?,?,?,?,00000028), ref: 00D83F1B
                                            • SetEnvironmentVariableW.KERNEL32(sfxpar,?,?,?,?,?,?,?,00000028), ref: 00D83F86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: EnvironmentVariable$H_prolog3_
                                            • String ID: sfxcmd$sfxpar
                                            • API String ID: 3605364767-3493335439
                                            • Opcode ID: 3f846e550d7d4741ca43bef705c164d05c3e0a4fca390c9ee7d3cdb6b7162ed0
                                            • Instruction ID: 60f2fc773384feb90a349783ebfc7c8d3c158afc970d5085474a6a9594bcdd01
                                            • Opcode Fuzzy Hash: 3f846e550d7d4741ca43bef705c164d05c3e0a4fca390c9ee7d3cdb6b7162ed0
                                            • Instruction Fuzzy Hash: D121F370D102189FCF14EFA8E9859ADB7F9EF08701B50441AF549A7240DB30AA48CBB4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1080 d7f2ce-d7f2f7 GetClassNameW 1081 d7f31f-d7f321 1080->1081 1082 d7f2f9-d7f30e call d78da4 1080->1082 1084 d7f323-d7f325 1081->1084 1085 d7f32c-d7f338 call d85734 1081->1085 1088 d7f310-d7f31c FindWindowExW 1082->1088 1089 d7f31e 1082->1089 1084->1085 1088->1089 1089->1081
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000050), ref: 00D7F2EF
                                            • SHAutoComplete.SHLWAPI(?,00000010), ref: 00D7F326
                                              • Part of subcall function 00D78DA4: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,00D70E3F,?,?,?,00000046,00D71ECE,00000046,?,exe,00000046), ref: 00D78DBA
                                            • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00D7F316
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AutoClassCompareCompleteFindNameStringWindow
                                            • String ID: @Ut$EDIT
                                            • API String ID: 4243998846-2065656831
                                            • Opcode ID: 7d282ed03d9be74f092ec3314c4a38edf9091f24ebc4448623d5ba672991c71d
                                            • Instruction ID: 9646dd702de9cd1af0d74bfe2083e9b025ab20d727241f13228c049b763198af
                                            • Opcode Fuzzy Hash: 7d282ed03d9be74f092ec3314c4a38edf9091f24ebc4448623d5ba672991c71d
                                            • Instruction Fuzzy Hash: 66F0A431A01618EBDB20AB249C09F9FB7BCDF86B00F044166FA04EB2D0E6B0A9058675

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00D76C5E: __EH_prolog3_GS.LIBCMT ref: 00D76C65
                                              • Part of subcall function 00D76C5E: GetSystemDirectoryW.KERNEL32(00000000,00000104), ref: 00D76C9A
                                            • OleInitialize.OLE32(00000000), ref: 00D7F4ED
                                            • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00D7F524
                                            • SHGetMalloc.SHELL32(00DB532C), ref: 00D7F52E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: DirectoryGdiplusH_prolog3_InitializeMallocStartupSystem
                                            • String ID: riched20.dll$3Qo
                                            • API String ID: 2446841611-4232643773
                                            • Opcode ID: a822258f7500212cf7d5e438ebbe1fa94c41afd5bbf469e6b257d2e1fc80e9ae
                                            • Instruction ID: c116ee17534a278986a76c6790ad8438325b68262d5d2858a0440a11aec65bc4
                                            • Opcode Fuzzy Hash: a822258f7500212cf7d5e438ebbe1fa94c41afd5bbf469e6b257d2e1fc80e9ae
                                            • Instruction Fuzzy Hash: CBF0F9B1D04209EBCB10AF99D8499EEFFFCEF94744F10415AE415E2251D7B856058BB1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1095 d6e180-d6e1c9 1096 d6e1d4 1095->1096 1097 d6e1cb-d6e1ce 1095->1097 1099 d6e1d6-d6e1e6 1096->1099 1097->1096 1098 d6e1d0-d6e1d2 1097->1098 1098->1099 1100 d6e1ee-d6e1f8 1099->1100 1101 d6e1e8 1099->1101 1102 d6e1fd-d6e22a 1100->1102 1103 d6e1fa 1100->1103 1101->1100 1104 d6e232-d6e238 1102->1104 1105 d6e22c 1102->1105 1103->1102 1106 d6e23c-d6e254 CreateFileW 1104->1106 1107 d6e23a 1104->1107 1105->1104 1108 d6e316 1106->1108 1109 d6e25a-d6e28a GetLastError call d7169a 1106->1109 1107->1106 1111 d6e319-d6e31c 1108->1111 1115 d6e2be 1109->1115 1116 d6e28c-d6e293 1109->1116 1113 d6e31e-d6e321 1111->1113 1114 d6e32a-d6e32e 1111->1114 1113->1114 1117 d6e323 1113->1117 1118 d6e330-d6e333 1114->1118 1119 d6e34f-d6e360 1114->1119 1123 d6e2c1-d6e2cb 1115->1123 1120 d6e295 1116->1120 1121 d6e298-d6e2b8 CreateFileW GetLastError 1116->1121 1117->1114 1118->1119 1122 d6e335-d6e34c SetFileTime 1118->1122 1124 d6e374-d6e39a call d61a66 call d85734 1119->1124 1125 d6e362-d6e370 call d625c3 1119->1125 1120->1121 1121->1115 1127 d6e2ba-d6e2bc 1121->1127 1122->1119 1128 d6e300-d6e314 1123->1128 1129 d6e2cd-d6e2e2 1123->1129 1125->1124 1127->1123 1128->1111 1132 d6e2f7-d6e2ff call d85726 1129->1132 1133 d6e2e4-d6e2f4 call d619a9 1129->1133 1132->1128 1133->1132
                                            APIs
                                            • CreateFileW.KERNELBASE(?,00000001,00000000,00000000,00000003,08000000,00000000,7889FE40,?,?,00000000,?,?,00000000,00D99E6B,000000FF), ref: 00D6E248
                                            • GetLastError.KERNEL32(?,?,00000000,00D99E6B,000000FF,?,00000011,?,?,00000000,?,?,?,?,?,?), ref: 00D6E25A
                                            • CreateFileW.KERNEL32(?,00000001,00000000,00000000,00000003,08000000,00000000,?,?,?,?,00000000,00D99E6B,000000FF,?,00000011), ref: 00D6E2A6
                                            • GetLastError.KERNEL32(?,?,00000000,00D99E6B,000000FF,?,00000011,?,?,00000000,?,?,?,?,?,?), ref: 00D6E2AF
                                            • SetFileTime.KERNEL32(00000000,00000000,?,00000000,?,?,00000000,00D99E6B,000000FF,?,00000011,?,?,00000000,?,?), ref: 00D6E346
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: File$CreateErrorLast$Time
                                            • String ID:
                                            • API String ID: 1999340476-0
                                            • Opcode ID: f2e4ad709db17d96f2f21e4a8eb05a96ee5d3dfd6b3a8ce9095dc04b7df79500
                                            • Instruction ID: 2c0b7ca3b69bb9ad532e0aa9da3f0be33e129cf03514b10058bd7961d2351482
                                            • Opcode Fuzzy Hash: f2e4ad709db17d96f2f21e4a8eb05a96ee5d3dfd6b3a8ce9095dc04b7df79500
                                            • Instruction Fuzzy Hash: 1F619B74910349DFDB24CFA8C885BEEBBA5FB08314F24462AF819D7380D774A944CBA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1141 d774ec-d77536 call d777cf ReleaseSemaphore 1144 d77556-d7758a DeleteCriticalSection CloseHandle * 2 1141->1144 1145 d77538 1141->1145 1146 d7753b-d77554 call d775ed CloseHandle 1145->1146 1146->1144
                                            APIs
                                              • Part of subcall function 00D777CF: ResetEvent.KERNEL32(?,?,?,?,?,?,?,?,00000004,00D673B8), ref: 00D777E1
                                              • Part of subcall function 00D777CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00000004,00D673B8), ref: 00D777F5
                                            • ReleaseSemaphore.KERNEL32(?,00000040,00000000,7889FE40,?,?,00000001,00000000,00D9A603,000000FF,?,00D790B9,?,?,00D65630,?), ref: 00D7752A
                                            • CloseHandle.KERNELBASE(?,?,?,00D790B9,?,?,00D65630,?,?,?,00000000,?,?,?,00000001,?), ref: 00D77544
                                            • DeleteCriticalSection.KERNEL32(?,?,00D790B9,?,?,00D65630,?,?,?,00000000,?,?,?,00000001,?,?), ref: 00D7755D
                                            • CloseHandle.KERNEL32(?,?,00D790B9,?,?,00D65630,?,?,?,00000000,?,?,?,00000001,?,?), ref: 00D77569
                                            • CloseHandle.KERNEL32(?,?,00D790B9,?,?,00D65630,?,?,?,00000000,?,?,?,00000001,?,?), ref: 00D77575
                                              • Part of subcall function 00D775ED: WaitForSingleObject.KERNEL32(?,000000FF,00D7770A,?,?,00D7777F,?,?,?,?,?,00D77769), ref: 00D775F3
                                              • Part of subcall function 00D775ED: GetLastError.KERNEL32(?,?,00D7777F,?,?,?,?,?,00D77769), ref: 00D775FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                            • String ID:
                                            • API String ID: 1868215902-0
                                            • Opcode ID: 7aabdd591a5a08129d9a730ba1f59410f81e409106cd8da9437ab7fb0a230ef2
                                            • Instruction ID: 678b0c0e32d47f4b65a2becd1d03cec7d46994fe2bbcca388c434e66f84f2de9
                                            • Opcode Fuzzy Hash: 7aabdd591a5a08129d9a730ba1f59410f81e409106cd8da9437ab7fb0a230ef2
                                            • Instruction Fuzzy Hash: CB118072504704EFC7229F64DC84FC6FBA9FB08750F40492AF16AD22A0DB71A941CB70

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1149 d80678-d80691 PeekMessageW 1150 d806cc-d806ce 1149->1150 1151 d80693-d806a7 GetMessageW 1149->1151 1152 d806b8-d806c6 TranslateMessage DispatchMessageW 1151->1152 1153 d806a9-d806b6 IsDialogMessageW 1151->1153 1152->1150 1153->1150 1153->1152
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D80689
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D8069A
                                            • IsDialogMessageW.USER32(00010444,?), ref: 00D806AE
                                            • TranslateMessage.USER32(?), ref: 00D806BC
                                            • DispatchMessageW.USER32(?), ref: 00D806C6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Message$DialogDispatchPeekTranslate
                                            • String ID:
                                            • API String ID: 1266772231-0
                                            • Opcode ID: dac4fc4c27d1c86eca1aa255b270221581af86f7466258b7a29f2fd73dc57901
                                            • Instruction ID: 7915a8cdfea596e120fe9705a8d92839464905d5fd13ce0f3d246820c4babffd
                                            • Opcode Fuzzy Hash: dac4fc4c27d1c86eca1aa255b270221581af86f7466258b7a29f2fd73dc57901
                                            • Instruction Fuzzy Hash: 0BF0BDB1D0631AEB8B20BBA2EC4DEDB7FBCEF852917444515B506D2150E624D505CBB0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1154 d82813-d82845 call d67673 1157 d8284a-d82850 1154->1157 1158 d82847 1154->1158 1159 d82abd 1157->1159 1160 d82856-d8285b 1157->1160 1158->1157 1163 d82abf-d82ac3 1159->1163 1161 d8285d 1160->1161 1162 d82860-d8286e 1160->1162 1161->1162 1164 d82870-d8287c 1162->1164 1165 d82896 1162->1165 1166 d82ace-d82ad2 1163->1166 1167 d82ac5-d82ac8 1163->1167 1164->1165 1168 d8287e 1164->1168 1169 d82899-d8289c 1165->1169 1171 d82af7 1166->1171 1172 d82ad4-d82ad7 1166->1172 1170 d82aca-d82acc 1167->1170 1167->1171 1173 d82884-d82888 1168->1173 1174 d828a2-d828a7 1169->1174 1175 d82ab7 1169->1175 1176 d82ada-d82af2 call d67673 call d838a0 1170->1176 1179 d834ad-d834e9 call d658cb 1171->1179 1172->1171 1177 d82ad9 1172->1177 1180 d8288e-d82894 1173->1180 1181 d829f0-d829f2 1173->1181 1182 d828a9 1174->1182 1183 d828ac-d828d7 call d8acee call d61afc 1174->1183 1175->1159 1176->1171 1177->1176 1180->1165 1180->1173 1181->1165 1185 d829f8-d829fc 1181->1185 1182->1183 1183->1179 1193 d828dd-d828e1 1183->1193 1185->1169 1194 d828e3 1193->1194 1195 d828e5-d828ec 1193->1195 1194->1195 1196 d828ee 1195->1196 1197 d828f1-d8292f call d6120c call d7645a 1195->1197 1196->1197 1202 d82935-d82937 1197->1202 1203 d8293d-d8299f call d614a7 call d6adaa call d61a66 call d614a7 call d6adaa call d61a66 1202->1203 1204 d82a01-d82a07 1202->1204 1233 d829a1-d829a3 1203->1233 1234 d829a4-d829d2 call d614a7 call d6adaa call d61a66 1203->1234 1205 d82a09-d82a24 1204->1205 1206 d82a4e-d82a68 1204->1206 1208 d82a45-d82a4d call d85726 1205->1208 1209 d82a26-d82a3f call d619a9 1205->1209 1211 d82a6a-d82a85 1206->1211 1212 d82aaf-d82ab5 1206->1212 1208->1206 1209->1208 1213 d82aa6-d82aae call d85726 1211->1213 1214 d82a87-d82aa0 call d619a9 1211->1214 1212->1163 1213->1212 1214->1213 1233->1234 1241 d829d4-d829d6 1234->1241 1242 d829d7-d829eb call d7645a 1234->1242 1241->1242 1242->1202
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _wcslen
                                            • String ID: HIDE$MAX$MIN
                                            • API String ID: 176396367-2426493550
                                            • Opcode ID: ec6b97e92b036eee7f97132119e73606c770c4533b0b71f1d2302b366e617623
                                            • Instruction ID: 3d284db615b3fa74c92f487d6190bf63253d0aa708d7419287ae294d4411f9f1
                                            • Opcode Fuzzy Hash: ec6b97e92b036eee7f97132119e73606c770c4533b0b71f1d2302b366e617623
                                            • Instruction Fuzzy Hash: BEA12A72C00258DFCF25EBA4C885AEDB7B8FF49310F14059AD445B7241DA319A89CF70

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1245 d6e948-d6e961 call d857d8 1248 d6e963-d6e965 1245->1248 1249 d6e96a-d6e974 1245->1249 1250 d6eaa6-d6eaab call d85787 1248->1250 1251 d6e976-d6e983 GetStdHandle 1249->1251 1252 d6e988 1249->1252 1253 d6ea6f-d6ea72 1251->1253 1254 d6e98b-d6e998 1252->1254 1253->1254 1256 d6e9df-d6e9f4 WriteFile 1254->1256 1257 d6e99a-d6e99e 1254->1257 1259 d6e9f7-d6e9f9 1256->1259 1260 d6e9a0-d6e9ab 1257->1260 1261 d6e9ff-d6ea03 1257->1261 1259->1261 1262 d6ea9f-d6eaa2 1259->1262 1264 d6e9af-d6e9ce WriteFile 1260->1264 1265 d6e9ad 1260->1265 1261->1262 1263 d6ea09-d6ea0d 1261->1263 1262->1250 1263->1262 1267 d6ea13-d6ea25 call d69230 1263->1267 1264->1259 1266 d6e9d0-d6e9db 1264->1266 1265->1264 1266->1260 1268 d6e9dd 1266->1268 1271 d6ea77-d6ea9a call d614a7 call d69653 call d61a66 1267->1271 1272 d6ea27-d6ea30 1267->1272 1268->1259 1271->1262 1272->1254 1274 d6ea36-d6ea3a 1272->1274 1274->1254 1276 d6ea40-d6ea6c 1274->1276 1276->1253
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6E94F
                                            • GetStdHandle.KERNEL32(000000F5,0000002C,00D72D28,?,?,?,?,00000000,00D7ABB6,?,?,?,?,?,00D7A80E,?), ref: 00D6E978
                                            • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D6E9BE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FileH_prolog3_HandleWrite
                                            • String ID:
                                            • API String ID: 2898186245-0
                                            • Opcode ID: c2917afe6f5c9ed8fb6887f620600aeb2d48c33e9e0ad770f605aa52d9b0a553
                                            • Instruction ID: 95a9acc964edc93d9606fb33a49956b05377ae9e64db99b8ae52be5976107f64
                                            • Opcode Fuzzy Hash: c2917afe6f5c9ed8fb6887f620600aeb2d48c33e9e0ad770f605aa52d9b0a553
                                            • Instruction Fuzzy Hash: A7419A39A11218ABDF14DFA8D884BAEBB76FF84700F184119F801AB394CB719D44CBB1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1284 d6efef-d6f00a call d857d8 call d713da 1289 d6f031-d6f033 1284->1289 1290 d6f00c-d6f00f 1284->1290 1292 d6f035-d6f03d call d6ed0d 1289->1292 1290->1289 1291 d6f011-d6f017 1290->1291 1293 d6f01b-d6f029 CreateDirectoryW 1291->1293 1294 d6f019 1291->1294 1301 d6f0e3-d6f0f0 GetLastError 1292->1301 1302 d6f043-d6f065 call d7169a 1292->1302 1296 d6f0d0-d6f0d4 1293->1296 1297 d6f02f 1293->1297 1294->1293 1299 d6f0d6-d6f0da call d6f58b 1296->1299 1300 d6f0df-d6f0e1 1296->1300 1297->1292 1299->1300 1303 d6f0fb-d6f100 call d85787 1300->1303 1301->1303 1304 d6f0f2-d6f0fa 1301->1304 1309 d6f067-d6f06e 1302->1309 1310 d6f07d-d6f087 1302->1310 1304->1303 1312 d6f073-d6f07b CreateDirectoryW 1309->1312 1313 d6f070 1309->1313 1314 d6f0bc-d6f0ce 1310->1314 1315 d6f089-d6f09e 1310->1315 1312->1310 1313->1312 1314->1296 1314->1301 1316 d6f0b3-d6f0bb call d85726 1315->1316 1317 d6f0a0-d6f0b0 call d619a9 1315->1317 1316->1314 1317->1316
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6EFF6
                                            • CreateDirectoryW.KERNELBASE(?,00000000,?,00000024,00D6EBA7,?,00000001,00000000,?,?,00000024,00D6A4DE,?,00000001,?,?), ref: 00D6F01F
                                            • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,?,00000024,00D6EBA7,?,00000001,00000000,?,?,00000024,00D6A4DE,?), ref: 00D6F075
                                            • GetLastError.KERNEL32(?,?,00000024,00D6EBA7,?,00000001,00000000,?,?,00000024,00D6A4DE,?,00000001,?,?,00000000), ref: 00D6F0E3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CreateDirectory$ErrorH_prolog3_Last
                                            • String ID:
                                            • API String ID: 3709856315-0
                                            • Opcode ID: c96c999dc2cdbbf5f7bbb2d800bb08bc0fadd95abd1944ad8edfc61ab16fcfc4
                                            • Instruction ID: 5e160776483c80db77a1b8c2090d2a843b014079ff70f6a4e8773f0e93445f45
                                            • Opcode Fuzzy Hash: c96c999dc2cdbbf5f7bbb2d800bb08bc0fadd95abd1944ad8edfc61ab16fcfc4
                                            • Instruction Fuzzy Hash: 7C318175900609DBDF10EFE9E889AEEBBF8EF48340F14442AE541E3252D7349985CB75
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F6,?,?,?,00000000,00D6E5D2,?,?,00000000,?,00000000), ref: 00D6E029
                                            • ReadFile.KERNELBASE(?,?,00000000,00100000,00000000,?,?,?,00000000,00D6E5D2,?,?,00000000,?,00000000), ref: 00D6E041
                                            • GetLastError.KERNEL32(?,?,?,00000000,00D6E5D2,?,?,00000000,?,00000000), ref: 00D6E073
                                            • GetLastError.KERNEL32(?,?,?,00000000,00D6E5D2,?,?,00000000,?,00000000), ref: 00D6E092
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorLast$FileHandleRead
                                            • String ID:
                                            • API String ID: 2244327787-0
                                            • Opcode ID: 4415fc7d3e5f95a32c986af41f2d539eee3c1e9bafa74edecfccd6f241b04d5b
                                            • Instruction ID: 5d5e75f0584c4d770ba29be03ef6a758bf6c5a003193e031b452468b40f9ad99
                                            • Opcode Fuzzy Hash: 4415fc7d3e5f95a32c986af41f2d539eee3c1e9bafa74edecfccd6f241b04d5b
                                            • Instruction Fuzzy Hash: 83118E38510308EBDF309F69C804A7E37A9FB41361F24462AE466C6291D7F5DE44DB71
                                            APIs
                                            • CreateThread.KERNELBASE(00000000,00010000,Function_00017760,?,00000000,?), ref: 00D7764C
                                            • SetThreadPriority.KERNEL32(?,00000000,?,?,?,?,00000004,00D6736D,00D65AB0,?), ref: 00D77693
                                              • Part of subcall function 00D692EB: __EH_prolog3_GS.LIBCMT ref: 00D692F2
                                              • Part of subcall function 00D69500: __EH_prolog3_GS.LIBCMT ref: 00D69507
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3_Thread$CreatePriority
                                            • String ID: CreateThread failed
                                            • API String ID: 3138599208-3849766595
                                            • Opcode ID: 6d57cd0ae9213ac939127faa403a9908282858792398684d2f706fe4d55eea57
                                            • Instruction ID: 57e27ea1cf9f07e2fa5b46706bf49f812ae378b46803d790ce3f37c926f0071c
                                            • Opcode Fuzzy Hash: 6d57cd0ae9213ac939127faa403a9908282858792398684d2f706fe4d55eea57
                                            • Instruction Fuzzy Hash: 9601D671348705AFE3146E68EC81F66739CEB85711F20052EF64A96284EAF16804C67C
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6DEA1
                                            • CreateFileW.KERNELBASE(?,?,?,00000000,00000002,00000000,00000000,?,00000024,00D6E8F5,?,?,00D6A6B9,?,00000011,?), ref: 00D6DF15
                                            • CreateFileW.KERNEL32(?,?,?,00000000,00000002,00000000,00000000,?,?,?,00D6D303,?,?,?), ref: 00D6DF65
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CreateFile$H_prolog3_
                                            • String ID:
                                            • API String ID: 1771569470-0
                                            • Opcode ID: d72e222fccef98605d405545c32ef83a043f59a1bf874d53d1d6f23af3d0fbbc
                                            • Instruction ID: 7fbdb59d6f688d4a9c67ab6d22ec62c15c889e24f3daf8bf9427dacfc9f996a4
                                            • Opcode Fuzzy Hash: d72e222fccef98605d405545c32ef83a043f59a1bf874d53d1d6f23af3d0fbbc
                                            • Instruction Fuzzy Hash: 1C417C70E102089FDB14DFA8E88ABEEB7F5EF08321F14561EF456E6281D774A9448B34
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D76C65
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000104), ref: 00D76C9A
                                            • LoadLibraryW.KERNELBASE(00000000,?,?,00000000,00000000,?), ref: 00D76D0C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: DirectoryH_prolog3_LibraryLoadSystem
                                            • String ID:
                                            • API String ID: 1552931673-0
                                            • Opcode ID: 0b6e1bac50b7b97b6e2a75c36a43f30a289dc8104d90f3d5eea9345d91418deb
                                            • Instruction ID: 9981b15dfbeb991610818ec07d2fe7909c3409b31da1f21a38bacec83f043120
                                            • Opcode Fuzzy Hash: 0b6e1bac50b7b97b6e2a75c36a43f30a289dc8104d90f3d5eea9345d91418deb
                                            • Instruction Fuzzy Hash: 78318E75D10248DBDB04EBE4C889BEEBBB8EF48314F14411AE509B7245EB74AA49CB71
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6F592
                                            • SetFileAttributesW.KERNELBASE(?,?,00000024,00D6A724,?,?,?,00000011,?,?,00000000,?,?,?,?,?), ref: 00D6F5A8
                                            • SetFileAttributesW.KERNEL32(?,?,?,?,?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049), ref: 00D6F5EB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AttributesFile$H_prolog3_
                                            • String ID:
                                            • API String ID: 2559025557-0
                                            • Opcode ID: 15bc45146d461e1b727c2ed840a002e3708cbe0a6552b01ad13a323c0d84bb6f
                                            • Instruction ID: 7c6715e5f6d22d40b32477fc703e8f9655437361539518d020b93a3e40d51d1a
                                            • Opcode Fuzzy Hash: 15bc45146d461e1b727c2ed840a002e3708cbe0a6552b01ad13a323c0d84bb6f
                                            • Instruction Fuzzy Hash: FD11E475910609EBDF04EFA8E985ADEB7B8FF08311F54902AE405E7250DB349A94CB74
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6EC6A
                                            • DeleteFileW.KERNELBASE(?,00000024,00D6D6F7,?), ref: 00D6EC7D
                                            • DeleteFileW.KERNEL32(00000000,?,00000000), ref: 00D6ECBD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: DeleteFile$H_prolog3_
                                            • String ID:
                                            • API String ID: 3558260747-0
                                            • Opcode ID: c51aa7897af2c455ffb3af927971298d5159c39d361693ce664b9af508aa2c1c
                                            • Instruction ID: 7b9a27a821a7f68bbc78e7f403bcf83f7ecb7c62ba784399ca7ed9df1cd3f911
                                            • Opcode Fuzzy Hash: c51aa7897af2c455ffb3af927971298d5159c39d361693ce664b9af508aa2c1c
                                            • Instruction Fuzzy Hash: B711D775D10219DBDF04DFA8E889EDEB7F8EF48311F18502AE405E7250D734A9848B78
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6ED26
                                            • GetFileAttributesW.KERNELBASE(?,00000024,00D6ED16,00000000,00D6A4A1,7889FE40,?,00D6CDDD,?,?,?,?,?,?,?,?), ref: 00D6ED39
                                            • GetFileAttributesW.KERNELBASE(?,?,?), ref: 00D6ED79
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AttributesFile$H_prolog3_
                                            • String ID:
                                            • API String ID: 2559025557-0
                                            • Opcode ID: e5cc94e096147a24dc0f87f023a5f5a3f4df64859183b4a8771a313c258100d5
                                            • Instruction ID: 9abc57aa2f8fe63f4ce6aafca74d9893a6ed473463c1088c9a3e2b757519ac8a
                                            • Opcode Fuzzy Hash: e5cc94e096147a24dc0f87f023a5f5a3f4df64859183b4a8771a313c258100d5
                                            • Instruction Fuzzy Hash: C8110479910218DBCF04EFA8E9899EDB7F9EB48320F14552AE505F7380DA3099848F74
                                            APIs
                                            • SetFilePointer.KERNELBASE(000000FF,?,?,?,?,00000000,?,00000000,00D6E3B1,?,?,00000000,?,?,00D6CC21,?), ref: 00D6E55F
                                            • GetLastError.KERNEL32 ref: 00D6E56E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastPointer
                                            • String ID:
                                            • API String ID: 2976181284-0
                                            • Opcode ID: 6c2bb2994d21b3bec854624f05e5060e89f125586e61669362b5d97fea828ed2
                                            • Instruction ID: 4602957743df228c3cbd49eb98356f8c80e2c88b300a4e3a1d9014ce288a4ffc
                                            • Opcode Fuzzy Hash: 6c2bb2994d21b3bec854624f05e5060e89f125586e61669362b5d97fea828ed2
                                            • Instruction Fuzzy Hash: C141F538604345CBD724EF74D4846AAB3E5FF98360F18492DD88687241EB74FC458BB1
                                            APIs
                                            • FlushFileBuffers.KERNEL32(?), ref: 00D6E78C
                                            • SetFileTime.KERNELBASE(?,?,?,?), ref: 00D6E840
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: File$BuffersFlushTime
                                            • String ID:
                                            • API String ID: 1392018926-0
                                            • Opcode ID: d9ad2dcd98172ba5db3ba05ae10e6a5e180a126e27d329853940fcada83493e4
                                            • Instruction ID: d927342b3cc2612b409d2f8c64be0c70f8021eb8dcf6b34b60bfaa1f1a8e5b5e
                                            • Opcode Fuzzy Hash: d9ad2dcd98172ba5db3ba05ae10e6a5e180a126e27d329853940fcada83493e4
                                            • Instruction Fuzzy Hash: 2721EF39259385EFC714DE24C891AABBBE8AF95704F08891DF4C5C7181E329E90CDB72
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D7FB52
                                            • SHFileOperationW.SHELL32(?,?,?,?,?,?,00000000,00DB535C), ref: 00D7FC24
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FileH_prolog3_Operation_wcslen
                                            • String ID:
                                            • API String ID: 3104323202-0
                                            • Opcode ID: febb91425be8b7d73fd4050d054fe963c41ab4e55e33499350f5ed72f46bdcdf
                                            • Instruction ID: bbf4b31adc1fc92b9e80d199d8aa98026cb90ce6c295bf6c318637a1f02b4504
                                            • Opcode Fuzzy Hash: febb91425be8b7d73fd4050d054fe963c41ab4e55e33499350f5ed72f46bdcdf
                                            • Instruction Fuzzy Hash: 3D310371D00348DADB21EFE9C896ADCBBB4FF08310F58412EE019A7296EB701A45CB30
                                            APIs
                                            • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00D6E897
                                            • GetLastError.KERNEL32 ref: 00D6E8A4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastPointer
                                            • String ID:
                                            • API String ID: 2976181284-0
                                            • Opcode ID: 90919a74f3881f81f3cfd549ce81380460ec7821a19521df4a13a4ca87833306
                                            • Instruction ID: 59908606fbd905ad06656cb1a5aff236548b51cc54ee94d4c340b368df30acec
                                            • Opcode Fuzzy Hash: 90919a74f3881f81f3cfd549ce81380460ec7821a19521df4a13a4ca87833306
                                            • Instruction Fuzzy Hash: AE11E134600710ABE7249668C840BA6B3E9EB85360F640769E052D36D0D7B0FD09DBB4
                                            APIs
                                            • __EH_prolog3_catch_GS.LIBCMT ref: 00D83C82
                                            • _wcslen.LIBCMT ref: 00D83C99
                                              • Part of subcall function 00D76A89: _wcslen.LIBCMT ref: 00D76AA6
                                              • Part of subcall function 00D6B03D: __EH_prolog3_GS.LIBCMT ref: 00D6B044
                                              • Part of subcall function 00D6B3E1: __EH_prolog3_GS.LIBCMT ref: 00D6B3E8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3__wcslen$H_prolog3_catch_
                                            • String ID:
                                            • API String ID: 1265872803-0
                                            • Opcode ID: a20055fd460c5443f4fe831825e0675e19b0dd68e038454c4550cb69d61cbf77
                                            • Instruction ID: 414595a48b9ac3d3ca1ccb500dcd46c71d5ef06bf26152c526ba94930f2b9fdc
                                            • Opcode Fuzzy Hash: a20055fd460c5443f4fe831825e0675e19b0dd68e038454c4550cb69d61cbf77
                                            • Instruction Fuzzy Hash: 2E118E39901B91EFCB05FBA8B851BDC7BA4EB1A310F04429BE445E7357DBB05A448BB1
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D61CE9
                                            • GetDlgItem.USER32(?,?), ref: 00D61D01
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3_Item_wcslen
                                            • String ID:
                                            • API String ID: 896027972-0
                                            • Opcode ID: 3d032c1939008d6cb79f30d93c75e73918d1cba166ed27336fb7c734196bf698
                                            • Instruction ID: 1dc13956c4c0254c88d2e77a00010487e9e6dd32907834ac7aeaf3b9cfb19e90
                                            • Opcode Fuzzy Hash: 3d032c1939008d6cb79f30d93c75e73918d1cba166ed27336fb7c734196bf698
                                            • Instruction Fuzzy Hash: 63018F79640314DFDB20EFA8C886BEDB7E8EF54340F48010AF916A72A1CB709A45CB70
                                            APIs
                                            • GetCurrentProcess.KERNEL32(02000000,?,00000002,00000002,?,00D776EA,00D70B6F), ref: 00D776B4
                                            • GetProcessAffinityMask.KERNEL32(00000000,?,00D776EA), ref: 00D776BB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Process$AffinityCurrentMask
                                            • String ID:
                                            • API String ID: 1231390398-0
                                            • Opcode ID: e19a8f802d0b8c9f87968458ea4d728b66fa1cfd105af26118812ef21cfeb8e9
                                            • Instruction ID: e5b57e3d060c2b3519c4cff8ee71233ab37a712940cf8cb4b9d5310175403567
                                            • Opcode Fuzzy Hash: e19a8f802d0b8c9f87968458ea4d728b66fa1cfd105af26118812ef21cfeb8e9
                                            • Instruction Fuzzy Hash: 71E0D833F24606A7CF1997AD9C059EF72DDEB44244718847AE417D3204F974DD0147B0
                                            APIs
                                            • GdiplusShutdown.GDIPLUS(?,?,?,?,00D99B73,000000FF), ref: 00D7F578
                                            • CoUninitialize.COMBASE(?,?,?,?,00D99B73,000000FF), ref: 00D7F57D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: GdiplusShutdownUninitialize
                                            • String ID:
                                            • API String ID: 3856339756-0
                                            • Opcode ID: 798180b0934f48ff510b65fad882cfd0820ae0d5f5c01fd4bd5857e56e096220
                                            • Instruction ID: 31fb28ffdf3d43e2684c55d08d1195f0529045fae38720d5297640db35d825a6
                                            • Opcode Fuzzy Hash: 798180b0934f48ff510b65fad882cfd0820ae0d5f5c01fd4bd5857e56e096220
                                            • Instruction Fuzzy Hash: 52F05E76604A04EFC710DF59EC41B4AFBE8FB49760F00422AF416C3760DB74A800CAB4
                                            APIs
                                            • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00D7E86A
                                            • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00D7E871
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: BitmapCreateFromGdipStream
                                            • String ID:
                                            • API String ID: 1918208029-0
                                            • Opcode ID: 45101601fe953db7df044cd381ee537d8270723b729a3e9da5f7e1887eaa5a95
                                            • Instruction ID: eee532f644b08423bba57bb926716c44134ab95e2898d00652e168eb69d990ce
                                            • Opcode Fuzzy Hash: 45101601fe953db7df044cd381ee537d8270723b729a3e9da5f7e1887eaa5a95
                                            • Instruction Fuzzy Hash: 41E01271901218EFCB10EF95C90579DB7F8EB48350F20C45AA88993701E674EE04EBB1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ItemShowWindow
                                            • String ID:
                                            • API String ID: 3351165006-0
                                            • Opcode ID: d0eb5a6ef34317406c23034f65a556c1b773919a6250713b0316e576023f78ad
                                            • Instruction ID: b89fa8f26851464add1482706a0ad6ca4b52bfeb42391be5c7a349fb24bc06cd
                                            • Opcode Fuzzy Hash: d0eb5a6ef34317406c23034f65a556c1b773919a6250713b0316e576023f78ad
                                            • Instruction Fuzzy Hash: CDC012B205C300FFCB020BB4DC09D2ABBA8ABE4212F00CA08B0A5D0160C239C010DB31
                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00D61CD2
                                            • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00D61CD9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherItemUser
                                            • String ID:
                                            • API String ID: 4250310104-0
                                            • Opcode ID: 43c90171282b50f8d976be1c450a388a76c51dea514e543f0865dcafc35e1fac
                                            • Instruction ID: 384ec847f332d1a827451f64b905cea76f37e21204a8cd22ab6651bdbc746435
                                            • Opcode Fuzzy Hash: 43c90171282b50f8d976be1c450a388a76c51dea514e543f0865dcafc35e1fac
                                            • Instruction Fuzzy Hash: 1BC00276408340FFCA015BA49D1882FBBA9AB95251B00DA49B5A5C0260C6358410DB31
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID:
                                            • API String ID: 431132790-0
                                            • Opcode ID: ff59845c50437142ebd723b6421b7b375ad35436be87a796c00b0c3837956298
                                            • Instruction ID: f51758ebb9c687f90d566f7067a075c4f0a318fc41318e1d31119172901ece51
                                            • Opcode Fuzzy Hash: ff59845c50437142ebd723b6421b7b375ad35436be87a796c00b0c3837956298
                                            • Instruction Fuzzy Hash: 0DC17930A04A559BDF25DF68C894BFD7BA0AB4A300F1C40BAEC45DF29AC7749945CBB1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID:
                                            • API String ID: 431132790-0
                                            • Opcode ID: c1e90d0ba2f8d7f907df66c5f8f2238f12c37dd97916a9d9f3a5e8dfc03b1967
                                            • Instruction ID: ad918e8ffe99bc3e7d32464d1fbabc08fc75414fc649a2a03377efa041d3da72
                                            • Opcode Fuzzy Hash: c1e90d0ba2f8d7f907df66c5f8f2238f12c37dd97916a9d9f3a5e8dfc03b1967
                                            • Instruction Fuzzy Hash: 7381F4739043148FDB28EE68C89AB6EF7E5EB40310F18892EE45D97181F7B0994487B6
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00D620B7
                                              • Part of subcall function 00D680EC: __EH_prolog3.LIBCMT ref: 00D680F3
                                              • Part of subcall function 00D72815: __EH_prolog3.LIBCMT ref: 00D7281C
                                              • Part of subcall function 00D676E7: __EH_prolog3.LIBCMT ref: 00D676EE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID:
                                            • API String ID: 431132790-0
                                            • Opcode ID: 5d926db0b47271e02d5565ae04c59788f002a7ef2280b137c302f1414d22dc01
                                            • Instruction ID: 966478a5f001d84912baad32272d0caa2377c91f5215d323490c65d00d18e738
                                            • Opcode Fuzzy Hash: 5d926db0b47271e02d5565ae04c59788f002a7ef2280b137c302f1414d22dc01
                                            • Instruction Fuzzy Hash: 4C51D4B1A097808EDB45DF6A84807D9BBE0AF59300F0886BEDC4DCE69BD7744245CB71
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6B3E8
                                              • Part of subcall function 00D6F711: FindClose.KERNELBASE(00000000,000000FF,00000049,00000049,?,?,00D6A684,?,?,00000000,?,?,?,?,?,?), ref: 00D6F739
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CloseFindH_prolog3_
                                            • String ID:
                                            • API String ID: 2672038326-0
                                            • Opcode ID: 2ece2d862532b23ae9e87a7d84ca6f51f2cf946907124ee81c5b4db004f33883
                                            • Instruction ID: b45489c2d646377f3f0bbe49fe6a6c0fc056632e0be2e1d8b0f8e501764ce9bd
                                            • Opcode Fuzzy Hash: 2ece2d862532b23ae9e87a7d84ca6f51f2cf946907124ee81c5b4db004f33883
                                            • Instruction Fuzzy Hash: CA414C70900708CFDB20DF69C8816A9B7B1FF45318F54446EE15ADB352EB34A885CB35
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D62C37
                                              • Part of subcall function 00D7880E: __EH_prolog3.LIBCMT ref: 00D78815
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3H_prolog3_
                                            • String ID:
                                            • API String ID: 3355343447-0
                                            • Opcode ID: 1cba0a9a38c8b89a2b54a73fcba0d85a08214ddc5e83cbe94976fe805fb7fa46
                                            • Instruction ID: 5d9b4c6e7c941ced3116a9ab4a5410f30699290d1cbbd5a49acde820f3b8ed85
                                            • Opcode Fuzzy Hash: 1cba0a9a38c8b89a2b54a73fcba0d85a08214ddc5e83cbe94976fe805fb7fa46
                                            • Instruction Fuzzy Hash: F731397190064CEFCF19EBE4E8959EEBBB9EF18300F58442AF405A7251DB319989CB70
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00D676EE
                                              • Part of subcall function 00D74F2B: __EH_prolog3.LIBCMT ref: 00D74F32
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID:
                                            • API String ID: 431132790-0
                                            • Opcode ID: e2f33e15f3a21c0e1274b2b3cd36afb800fc12e6638878fd79b715dc465e5551
                                            • Instruction ID: 715a06d5746868ad94d14485b25635393ad713e840deca718ff8f29132988e0f
                                            • Opcode Fuzzy Hash: e2f33e15f3a21c0e1274b2b3cd36afb800fc12e6638878fd79b715dc465e5551
                                            • Instruction Fuzzy Hash: DA4154B4806B85CAC725DF7AD1493DAFBE4AFA4300F10995FD0AE93361E7B025048F29
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID:
                                            • API String ID: 431132790-0
                                            • Opcode ID: d61870bd89c006dbfb7ff157f77524cc8352b03a7087bc77063f825e689cb00f
                                            • Instruction ID: 3e875ca1538dcec831ed5d62d44e6ce1efe33ff42faa0501c15123a32a9ff7e3
                                            • Opcode Fuzzy Hash: d61870bd89c006dbfb7ff157f77524cc8352b03a7087bc77063f825e689cb00f
                                            • Instruction Fuzzy Hash: DE21C5B2D006129FEF18AF749C5AA5EB6A8FF04314F19413AE909AB6C1E7709940C7F5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID:
                                            • API String ID: 431132790-0
                                            • Opcode ID: dd47f4d270ecf40c3f2c6c2ef29ef85b1dd3ecf6d34ee6b2f86537a946802e00
                                            • Instruction ID: d4f97b1459fe1a62571eae1052a756bb44b9c0776faa4de4b6afabace16cb135
                                            • Opcode Fuzzy Hash: dd47f4d270ecf40c3f2c6c2ef29ef85b1dd3ecf6d34ee6b2f86537a946802e00
                                            • Instruction Fuzzy Hash: FB218675F0061A9BCB14DFE9DC81AAEB7BAEF84300F18401AE505A7201DB749E04CBB5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3_
                                            • String ID:
                                            • API String ID: 2427045233-0
                                            • Opcode ID: b9dbf8c778fc1e4170ba0b51f8fd23bb8c0fe8a138d6f5b89dd1915ab5fa5050
                                            • Instruction ID: e492f78b819534023c2106d41656a883e0b31dd1f066e2f65660e8ee6299b31f
                                            • Opcode Fuzzy Hash: b9dbf8c778fc1e4170ba0b51f8fd23bb8c0fe8a138d6f5b89dd1915ab5fa5050
                                            • Instruction Fuzzy Hash: 9E21A238601318AFDF20AE6CC846EEE73E9EF12750F185558F482A7181D7749E49C7B0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3_
                                            • String ID:
                                            • API String ID: 2427045233-0
                                            • Opcode ID: ea19871d286ac84a8a5a675087cbe435106e76fbf7f99e1d6554c240ba19cb92
                                            • Instruction ID: 0e3d74d7747b3ceb16ee9cbf0a8559bf67547cbb4bc48de0682b4753c3f303a6
                                            • Opcode Fuzzy Hash: ea19871d286ac84a8a5a675087cbe435106e76fbf7f99e1d6554c240ba19cb92
                                            • Instruction Fuzzy Hash: 48213B71940209EFDF08EFA8D886EDE7BF9EF48300F54411AE105E7291DA359A49CB75
                                            APIs
                                              • Part of subcall function 00D91DE6: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00D900BA,00000001,00000364,?,00D86C16,?,?,?,?,?,00D85269,00D8535E), ref: 00D91E27
                                            • _free.LIBCMT ref: 00D93195
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_free
                                            • String ID:
                                            • API String ID: 614378929-0
                                            • Opcode ID: 1518d1659949646fcdc75e8b8cef56d87410417c591bed282bf1eeecc91b9cfd
                                            • Instruction ID: 6534f5c8af13e41910299a81bcb11c3472c2196ad809a9289c38380914bf835a
                                            • Opcode Fuzzy Hash: 1518d1659949646fcdc75e8b8cef56d87410417c591bed282bf1eeecc91b9cfd
                                            • Instruction Fuzzy Hash: 9801F9762043056BEB21CF65DC4595AFBD9FB86370F29061DE59493280EA30A905C774
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00D900BA,00000001,00000364,?,00D86C16,?,?,?,?,?,00D85269,00D8535E), ref: 00D91E27
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: b4156aaff7036196a9859abc61dba31313259155f224e9fd76b1d5def9096b0a
                                            • Instruction ID: 0f31adb7360e6510039306e49647b24f1b3cb91fcb63237e5d844f163d100637
                                            • Opcode Fuzzy Hash: b4156aaff7036196a9859abc61dba31313259155f224e9fd76b1d5def9096b0a
                                            • Instruction Fuzzy Hash: DAF05436705227A6EF266B669C05F5B7749EF41770B194121FC08EA190DA60DD1187F0
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000000,00D8535E,?,?,00D86C16,?,?,?,?,?,00D85269,00D8535E,?,?,?,?), ref: 00D90440
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: e50ffa45bd65a5becc8bae6a8167cdf2f2f739a669f3235b5adca55c964f4dd7
                                            • Instruction ID: 829acb96321884387f27d073bc6f2a47c699ea6df81fd7d1e13c1b70f2d1dfe4
                                            • Opcode Fuzzy Hash: e50ffa45bd65a5becc8bae6a8167cdf2f2f739a669f3235b5adca55c964f4dd7
                                            • Instruction Fuzzy Hash: 7DE06D326413259EEF2137A5BC01B5B3E8CDF417B0F2D4121EE88E6191DBA4CC0096F5
                                            APIs
                                              • Part of subcall function 00D6F826: __EH_prolog3_GS.LIBCMT ref: 00D6F830
                                              • Part of subcall function 00D6F826: FindFirstFileW.KERNELBASE(?,?,00000274,00D6F733,000000FF,00000049,00000049,?,?,00D6A684,?,?,00000000,?,?,?), ref: 00D6F859
                                              • Part of subcall function 00D6F826: FindFirstFileW.KERNEL32(?,?,?,?,?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049), ref: 00D6F8A4
                                              • Part of subcall function 00D6F826: GetLastError.KERNEL32(?,?,?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049,?,00000000), ref: 00D6F902
                                            • FindClose.KERNELBASE(00000000,000000FF,00000049,00000049,?,?,00D6A684,?,?,00000000,?,?,?,?,?,?), ref: 00D6F739
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Find$FileFirst$CloseErrorH_prolog3_Last
                                            • String ID:
                                            • API String ID: 765066492-0
                                            • Opcode ID: 81df23e6e555d8ce09d704f05c8e05550c3ae58e0b127d1d29f7377c9678c83f
                                            • Instruction ID: d9b38cec9cc02f652000feab6cc6d7e2a7885476000c60450e2c8b6aa9709198
                                            • Opcode Fuzzy Hash: 81df23e6e555d8ce09d704f05c8e05550c3ae58e0b127d1d29f7377c9678c83f
                                            • Instruction Fuzzy Hash: FAF0A735009B50AFCE215B645805A8B7FD1AF17374F044B49F0FD12192C63090559F36
                                            APIs
                                            • SetThreadExecutionState.KERNEL32(00000001), ref: 00D7742D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ExecutionStateThread
                                            • String ID:
                                            • API String ID: 2211380416-0
                                            • Opcode ID: 1c728a6c5bfe4dc9a6a9b191a07a163c1abf7412fc3bff56d669af4de6949969
                                            • Instruction ID: 922ee7d578683d1a856af203fa670cd4054ec23cbab28fd6f91d25ca364b8e27
                                            • Opcode Fuzzy Hash: 1c728a6c5bfe4dc9a6a9b191a07a163c1abf7412fc3bff56d669af4de6949969
                                            • Instruction Fuzzy Hash: 68D0121164915037EA15372568AA7FD2A0A8FCB315F094466B10D56283EA940846A3BA
                                            APIs
                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00D61206
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Concurrency::cancel_current_task
                                            • String ID:
                                            • API String ID: 118556049-0
                                            • Opcode ID: 679acea3c257f309f3b37c7a6b0c56e7ba53015130158bd6b89df0f0531ea031
                                            • Instruction ID: b04bd54de99af62ee7b30a5299fe3f59933aa6e635fbcadea76637f9c6f9dc6e
                                            • Opcode Fuzzy Hash: 679acea3c257f309f3b37c7a6b0c56e7ba53015130158bd6b89df0f0531ea031
                                            • Instruction Fuzzy Hash: DED0177A6026024B8628EB38847692E62A09E54306358422DF02ACA685EB21C8558739
                                            APIs
                                            • GdipAlloc.GDIPLUS(00000010), ref: 00D7EB0C
                                              • Part of subcall function 00D7E849: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00D7E86A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Gdip$AllocBitmapCreateFromStream
                                            • String ID:
                                            • API String ID: 1915507550-0
                                            • Opcode ID: 40d26e3062f3a0a4d923ad9eb1023a0fc0ac8bf0375a6db8f64136e7eac3b51d
                                            • Instruction ID: 401cc9e6d9f5a15f248df677aa6ec752f45511d3b0b3eb61ec7cb16d0994014e
                                            • Opcode Fuzzy Hash: 40d26e3062f3a0a4d923ad9eb1023a0fc0ac8bf0375a6db8f64136e7eac3b51d
                                            • Instruction Fuzzy Hash: EAD0A930200209BADF013F34CC02D7E7B98EF08340F00C161B84A85190FAB0EE10A2B1
                                            APIs
                                            • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 00D84256
                                              • Part of subcall function 00D80678: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D80689
                                              • Part of subcall function 00D80678: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D8069A
                                              • Part of subcall function 00D80678: IsDialogMessageW.USER32(00010444,?), ref: 00D806AE
                                              • Part of subcall function 00D80678: TranslateMessage.USER32(?), ref: 00D806BC
                                              • Part of subcall function 00D80678: DispatchMessageW.USER32(?), ref: 00D806C6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Message$DialogDispatchItemPeekSendTranslate
                                            • String ID:
                                            • API String ID: 897784432-0
                                            • Opcode ID: 9daaac6a025d04259a83e21eed0b55f06ab2ad3759f72293430b814d4866faa9
                                            • Instruction ID: bf45a0102e37727877c92503ccc9210a5dada0dea7252e8eb4f8b7bed0ffb8fe
                                            • Opcode Fuzzy Hash: 9daaac6a025d04259a83e21eed0b55f06ab2ad3759f72293430b814d4866faa9
                                            • Instruction Fuzzy Hash: C1D09276148300EBDA523B52DE0BF0A7AE2EB88B04F404694B349741B1D662DE30AB32
                                            APIs
                                              • Part of subcall function 00D84DD5: RtlAcquireSRWLockExclusive.NTDLL ref: 00D84DF2
                                            • DloadProtectSection.DELAYIMP ref: 00D84D54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AcquireDloadExclusiveLockProtectSection
                                            • String ID:
                                            • API String ID: 3680172570-0
                                            • Opcode ID: cc7aee3cfcb304eae74d86391208d5c0c79093bbda465e2441f8f576b3bddf30
                                            • Instruction ID: 98156d664fadc58a65023830480dc443bc0713312bf8e9da643f2e3536d6c4f8
                                            • Opcode Fuzzy Hash: cc7aee3cfcb304eae74d86391208d5c0c79093bbda465e2441f8f576b3bddf30
                                            • Instruction Fuzzy Hash: 4CD01234100762DEC712FB24AC4B7582350F704308F8D0B85F292C62A8CFB44450D731
                                            APIs
                                            • GetFileType.KERNELBASE(000000FF,00D6E052,?,?,?,00000000,00D6E5D2,?,?,00000000,?,00000000), ref: 00D6E15E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID:
                                            • API String ID: 3081899298-0
                                            • Opcode ID: 14124be558a3e1e6a94a931bcde28f1007f2ca55c014f7924eec845fdba5103d
                                            • Instruction ID: 5e61eec42fd1526f8835307b121471718023554b7dfc009e3cf1b899dc9b3613
                                            • Opcode Fuzzy Hash: 14124be558a3e1e6a94a931bcde28f1007f2ca55c014f7924eec845fdba5103d
                                            • Instruction Fuzzy Hash: 45C00278410309D78E314A289C494997722AA533A6BB89795D02DC96A1C33A8D97FA61
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: d177e090c994ce3a4bfa7aced970569fc9d2e2db5c95b952aaedc20e96bfb284
                                            • Instruction ID: b377789a782bfae5d5c0faa086a759ed26bf400f30fd064f8889549ac663139f
                                            • Opcode Fuzzy Hash: d177e090c994ce3a4bfa7aced970569fc9d2e2db5c95b952aaedc20e96bfb284
                                            • Instruction Fuzzy Hash: BEB0128226D112BD320471183E02D37014EDAC5B50331451EF001C1141E4448C440672
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 1ffb1157d016e40b37d9988ff908562ec38e79fd3ee7a488229c05ce982e2451
                                            • Instruction ID: d869352314c7c9093d7559e95b22e545df4ee5a6a891bf996fb9f4b4c04aed60
                                            • Opcode Fuzzy Hash: 1ffb1157d016e40b37d9988ff908562ec38e79fd3ee7a488229c05ce982e2451
                                            • Instruction Fuzzy Hash: 15B0129225D212BD334472183E02D37010DC6C5B50331461EF001C1141E4448C840672
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 747e1b9ad0bf454243d56cb5807e3d742981a9246478866896fce0d95bbfba56
                                            • Instruction ID: 350bb0a7c02f1c90b834387c6743a3c51b896be0ecb5b00b760973392a82a69b
                                            • Opcode Fuzzy Hash: 747e1b9ad0bf454243d56cb5807e3d742981a9246478866896fce0d95bbfba56
                                            • Instruction Fuzzy Hash: C7B0129235C212BD334471183E02D37010CC6C5F50330561EF001C1141E4448D840A32
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: c0d3d7a6c17d85a1da575df73808ca95803f5bedb985f542774c4fbeabcaec32
                                            • Instruction ID: dd221740401766e556de38a35101b127467dcf0d4680d85a6ccabf395aa639e0
                                            • Opcode Fuzzy Hash: c0d3d7a6c17d85a1da575df73808ca95803f5bedb985f542774c4fbeabcaec32
                                            • Instruction Fuzzy Hash: 26B0129235C112BD320471183E02D37010CCAC6F50330951EF401C1181E4448D440A32
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 2b11bcd6a69a5732134830d227d48cbc4384ea1a5620c45ca171cd0ceff0bf63
                                            • Instruction ID: 5908d05ccf54aab3e97e0ab4243adbb49308a4b8630181712ad99fc7bf31de18
                                            • Opcode Fuzzy Hash: 2b11bcd6a69a5732134830d227d48cbc4384ea1a5620c45ca171cd0ceff0bf63
                                            • Instruction Fuzzy Hash: E9B0128225C112BD330871683E02D37010CD6C5B50330891EF005C1241E4448C480632
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 901c0909b86a46739e142d6f65b20d4a309e0bbeacc4bd02ed7373dc5c2dc272
                                            • Instruction ID: bd72472380076ad71496a9e7c0b8cc6d1998993a4ea6014cd1381db0748fb792
                                            • Opcode Fuzzy Hash: 901c0909b86a46739e142d6f65b20d4a309e0bbeacc4bd02ed7373dc5c2dc272
                                            • Instruction Fuzzy Hash: 1DB0128225D112BD320471183E02D37010DC6C6B50331851EF401C11C1E4448C440672
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 159596cedb43b59fc920b048b4e8c50702faf34fe4a677842778b9f348687599
                                            • Instruction ID: 10c0c6fa8f68039bbd1ffc145926c56745998b589868c8492c12b486b15314da
                                            • Opcode Fuzzy Hash: 159596cedb43b59fc920b048b4e8c50702faf34fe4a677842778b9f348687599
                                            • Instruction Fuzzy Hash: D3B0129235C112BD320471183F02D37010CC6C5F50330555EF401C1141E4458E450A32
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: aed7d802af0a22a1d8838434fa77c5b2f726775c22981dafac95d8ea306660f8
                                            • Instruction ID: c8277c21ae7f8542fdf28a2269eefe7d6e7343af2cffc9dd27aaad6f006fdcad
                                            • Opcode Fuzzy Hash: aed7d802af0a22a1d8838434fa77c5b2f726775c22981dafac95d8ea306660f8
                                            • Instruction Fuzzy Hash: A0B0128625C212BD320471183E02D3B010CE6C5B50330451EF001C1241E444CC440732
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 255ba55a6698573064ba52f53f2977032986bc24fe2d3710109703c3cd810775
                                            • Instruction ID: 8281ef2a0d6c391adb2893f91211fad169a3ebee2e6f70d360a3b84c6a4694c3
                                            • Opcode Fuzzy Hash: 255ba55a6698573064ba52f53f2977032986bc24fe2d3710109703c3cd810775
                                            • Instruction Fuzzy Hash: B8B0128625C312BD320471183F02D3B010CD6C5B50330455EF401C1241E445CE450632
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: ee2ccc374d7dbdac0dfe6bf9b0d25d419d1c27b9def4fd1f115c4cd48224d66e
                                            • Instruction ID: 3b07ecf78de6906c7c0e2846b44c45779e70c2ccf0377a1f4e2c7572495b7a9c
                                            • Opcode Fuzzy Hash: ee2ccc374d7dbdac0dfe6bf9b0d25d419d1c27b9def4fd1f115c4cd48224d66e
                                            • Instruction Fuzzy Hash: 89B0128625C312BD334471183E02D3B010CD6C5B50330461EF001C1241E444CC840632
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 12df914c7600471cb5bb9baf97325d65e1f753344d6e92d51b9998276ecd9a4b
                                            • Instruction ID: bb3cc5cf6a9e3c238c0b7923d08a43ff8814f48d916b8723fe00d028e6ff62e4
                                            • Opcode Fuzzy Hash: 12df914c7600471cb5bb9baf97325d65e1f753344d6e92d51b9998276ecd9a4b
                                            • Instruction Fuzzy Hash: FDB0128225C112BD330871183F03D37010CC6C5B50330855EF405C1241E4458D4D0632
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: c451250ef601791967fbdd89a40a05e02653b2632e9b0899fbdb7ab0c11f74f4
                                            • Instruction ID: 402a1166957790491b60a6972c670742562decf554d5fbfb3da7face7bafb171
                                            • Opcode Fuzzy Hash: c451250ef601791967fbdd89a40a05e02653b2632e9b0899fbdb7ab0c11f74f4
                                            • Instruction Fuzzy Hash: D7B0128225C113BD330875183E02D37010CC6C6B50330C51EF405C1281E4448C480732
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: d1f996936f1f094db4d2c94dffaecf158d5fab5423b4c4e4e57656eeedfc6c18
                                            • Instruction ID: 6c941bd55f08b92dce583537fea3549a645064606296934ccb6a316919fd73cf
                                            • Opcode Fuzzy Hash: d1f996936f1f094db4d2c94dffaecf158d5fab5423b4c4e4e57656eeedfc6c18
                                            • Instruction Fuzzy Hash: 72B0129225C112BD320432143F02D77010CC6C1B50330455EF401D0042E8469D450536
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 5e712f1345c15752764e38718668308b6176fe9042c3abb2cbef82379c30cbf2
                                            • Instruction ID: 7bc0a19acee0544be38d834ec4999042e251a2ddebe2d2e0ec43d811b479dcd9
                                            • Opcode Fuzzy Hash: 5e712f1345c15752764e38718668308b6176fe9042c3abb2cbef82379c30cbf2
                                            • Instruction Fuzzy Hash: 5AB0128625C212BD320471183E02D3B010CD6C6B50330851EF401C1281E444DC440632
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: d6fd3e4e2a79ebb346b408aa79fbd9b0df068316e716a3ecde6dbba2aa2ac432
                                            • Instruction ID: c2f71790659513e7324be8931b942be237ff918ed3390f11a6cfb5d9a46cf6fa
                                            • Opcode Fuzzy Hash: d6fd3e4e2a79ebb346b408aa79fbd9b0df068316e716a3ecde6dbba2aa2ac432
                                            • Instruction Fuzzy Hash: 30B012C226C212BD320471187E02D37011CD6C5B50330461FF001C1141E4448C440636
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 69b4cdca75011959786f463c95c89abc52cd1f9a7e716bed5be25abaf2c0f70b
                                            • Instruction ID: 5882081bd7717940e21a0b884b3ea839cfb6e1e50f07e66ba7d00bab5b7da7f1
                                            • Opcode Fuzzy Hash: 69b4cdca75011959786f463c95c89abc52cd1f9a7e716bed5be25abaf2c0f70b
                                            • Instruction Fuzzy Hash: FDB012C225C112BD320471187F02D37011CC6C5B50370475EF401C1141E4458D450636
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 5d4f4126038023b92d609f816743676ea116548b872a4daa268bc401f924495a
                                            • Instruction ID: 21e5aae333266c05473ff9373b768c59adfbfba430a501e06c60fc2814c94545
                                            • Opcode Fuzzy Hash: 5d4f4126038023b92d609f816743676ea116548b872a4daa268bc401f924495a
                                            • Instruction Fuzzy Hash: E4B012C225C212BD334471187E02D37011CC6C5B50330471EF001C1141E4448C840636
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 85a36c1032c6847777dc38de921822ff913dbffcd890363e00b1c606af9486fc
                                            • Instruction ID: 0dc251e67e96f126619128cbb7f16562e42efb0249d8e785aa2cffdcb835d47e
                                            • Opcode Fuzzy Hash: 85a36c1032c6847777dc38de921822ff913dbffcd890363e00b1c606af9486fc
                                            • Instruction Fuzzy Hash: 90B0128225C112BD321471197E03D37010CC6C6B50330891EF401C5581E4448C440632
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 1e8a658364cdfae6f1ed015c7a73b7fca090005d7d28881c0a7af6fc667e8c2f
                                            • Instruction ID: 64dae1a6cd7c3de592150b06daa856cf01fc859cd6c87c458773c5b151b35407
                                            • Opcode Fuzzy Hash: 1e8a658364cdfae6f1ed015c7a73b7fca090005d7d28881c0a7af6fc667e8c2f
                                            • Instruction Fuzzy Hash: 0CB0129235C112FD310471091E13E3B015CC6C2F10330911FF401C1281D440EC440231
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 50b16a3ceb3cf354e818132dbe8393224249e5f95030ad6848ebe45a69190539
                                            • Instruction ID: 36e3127ba0ec95f659235cedcd754e9690c283362080231746dd6f68d390ed0d
                                            • Opcode Fuzzy Hash: 50b16a3ceb3cf354e818132dbe8393224249e5f95030ad6848ebe45a69190539
                                            • Instruction Fuzzy Hash: F3B0129235C112BD320471095E03E37015CC6C2F10330531FF001C1181D4409C880235
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: b14bc4595b5d5abd5d5343ccb21aab76aa85c65be690322fa8eb91f137f379c4
                                            • Instruction ID: f9ef82d89010b34cae9017ca065d29f919df2f2e5f904084035a63c714bde0d8
                                            • Opcode Fuzzy Hash: b14bc4595b5d5abd5d5343ccb21aab76aa85c65be690322fa8eb91f137f379c4
                                            • Instruction Fuzzy Hash: 39B0129235C012BD310471095F03E37115CC7C2F10330931FF101C1141D4409C450235
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 2c651e657f35675d199f71068248a84bf4404d0b139897b56b853f23d16261b1
                                            • Instruction ID: 0a931d52288f57c18d5513742124782b5357ab0eb6abbd8acd657a8be9763680
                                            • Opcode Fuzzy Hash: 2c651e657f35675d199f71068248a84bf4404d0b139897b56b853f23d16261b1
                                            • Instruction Fuzzy Hash: 33B0128265D012FD3144712A5E02D37011CC6C1B10331852FF401C1181D4404C480231
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 4c9893b4b83bfed4f6c432e95708e2097166dab2583277337ca74be45b68030e
                                            • Instruction ID: fe2a584099aaf4d750db5db1b321dd86113e328fc4d82223584895788411ea1a
                                            • Opcode Fuzzy Hash: 4c9893b4b83bfed4f6c432e95708e2097166dab2583277337ca74be45b68030e
                                            • Instruction Fuzzy Hash: 91B0128225D013FD3144711A5E02E36011CC6C1B10331452FF001C1541D4404C480231
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: d4f513c0e17356d378d9d30a9bea564cb706ac361290b356864e6c0b366247f9
                                            • Instruction ID: 832594df95388913c03f9efda998972f2a032e135dcedb151fa0c82c619e9785
                                            • Opcode Fuzzy Hash: d4f513c0e17356d378d9d30a9bea564cb706ac361290b356864e6c0b366247f9
                                            • Instruction Fuzzy Hash: 41B0128225D012FD3144711A5F02D37011CC7C1B10331852FF101C1141D4404C490231
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 0cf0933db3909746246fff44c62a353bd652366bf3abf3dc101e8ed6645760dd
                                            • Instruction ID: e9b67787ebfc71057fa656ae44a33933899c46c37678864053fbe2175cf071ae
                                            • Opcode Fuzzy Hash: 0cf0933db3909746246fff44c62a353bd652366bf3abf3dc101e8ed6645760dd
                                            • Instruction Fuzzy Hash: 3EB0128669D012FD310431061F02C36011CCFD1B11331861FF101C0042D4404C450131
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84CF1
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: aada9fc54b9b72ffdf79cadfc0cf11235789d2ee27224c2f310742adeeeff357
                                            • Instruction ID: 87130cd864486796251c32fa0c24d91ce52f6d5987b88c52ccec2fd1ace6f67f
                                            • Opcode Fuzzy Hash: aada9fc54b9b72ffdf79cadfc0cf11235789d2ee27224c2f310742adeeeff357
                                            • Instruction Fuzzy Hash: 79B0128625D113BD314472485E02D77010CC7C2B10330811EF401C21C1D4404C8C0231
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84CF1
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 12f8970d09929bfc4d4ec716bc0b269abc73a67fd393305e59f289c46df3a597
                                            • Instruction ID: 8dd388d48ef3d4521b39ef9fdc3b1b2cb13c14672468f88527eaf8c9e790bada
                                            • Opcode Fuzzy Hash: 12f8970d09929bfc4d4ec716bc0b269abc73a67fd393305e59f289c46df3a597
                                            • Instruction Fuzzy Hash: DBB0128625D213BD328471489E02D37010CC7C1B10330422EF001C1141D4414CCA0231
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84CF1
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 891eff87ca32c193ea4e8d76fcb7d43c7e4661a6967c8daf01e268b29e5f8e7c
                                            • Instruction ID: 5d802315e0ec69ea59f18aefe27b32468d96f394e62274496d9fe536cfac6178
                                            • Opcode Fuzzy Hash: 891eff87ca32c193ea4e8d76fcb7d43c7e4661a6967c8daf01e268b29e5f8e7c
                                            • Instruction Fuzzy Hash: 93B0128625D113BD314471489E02D37010CD7C1B10330412EF001C1141D4404C8A0231
                                            APIs
                                            • SetCurrentDirectoryW.KERNELBASE(?), ref: 00D72233
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory
                                            • String ID:
                                            • API String ID: 1611563598-0
                                            • Opcode ID: 91389c242371aff78d6e490549e10d69945193356f7ae50ecd08682446a85473
                                            • Instruction ID: 49f01444a9988c34e47becda05eba1ec7ac72c7e00c11f8c5cdd81a27e7335e4
                                            • Opcode Fuzzy Hash: 91389c242371aff78d6e490549e10d69945193356f7ae50ecd08682446a85473
                                            • Instruction Fuzzy Hash: 89C04870211200DF8704CFA8DA8CA0A77EABFA2706B81D469F448CF122D734DD60DA39
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: f545fdb60975946f506f517dd373aa83aecb1129cc0fff916c9c6b8a0b1880ca
                                            • Instruction ID: 4d07426b438d5a643106e06cb3f0af9bcaf88119768796b1484f0f1dca707ab7
                                            • Opcode Fuzzy Hash: f545fdb60975946f506f517dd373aa83aecb1129cc0fff916c9c6b8a0b1880ca
                                            • Instruction Fuzzy Hash: EDA002D76AD123BC321872617F07D3B021DD9CAFA13718E5EF542C5482F8899D891A76
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 0bfb679ca28fd1c37568f04a662c6127a780dc3950d6bde1937500ed9b596120
                                            • Instruction ID: 4d07426b438d5a643106e06cb3f0af9bcaf88119768796b1484f0f1dca707ab7
                                            • Opcode Fuzzy Hash: 0bfb679ca28fd1c37568f04a662c6127a780dc3950d6bde1937500ed9b596120
                                            • Instruction Fuzzy Hash: EDA002D76AD123BC321872617F07D3B021DD9CAFA13718E5EF542C5482F8899D891A76
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: fe01c5b59fb2e24687bc38a4d7b6fc1234628b82f6586816b7c52b64865aa7fa
                                            • Instruction ID: 4d07426b438d5a643106e06cb3f0af9bcaf88119768796b1484f0f1dca707ab7
                                            • Opcode Fuzzy Hash: fe01c5b59fb2e24687bc38a4d7b6fc1234628b82f6586816b7c52b64865aa7fa
                                            • Instruction Fuzzy Hash: EDA002D76AD123BC321872617F07D3B021DD9CAFA13718E5EF542C5482F8899D891A76
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: cfd280e3d68d94f9bf05533eaba6ffc3bbea13d18db95d6402b8b219969a9bb6
                                            • Instruction ID: 4d07426b438d5a643106e06cb3f0af9bcaf88119768796b1484f0f1dca707ab7
                                            • Opcode Fuzzy Hash: cfd280e3d68d94f9bf05533eaba6ffc3bbea13d18db95d6402b8b219969a9bb6
                                            • Instruction Fuzzy Hash: EDA002D76AD123BC321872617F07D3B021DD9CAFA13718E5EF542C5482F8899D891A76
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 072bbc43a9d6c92f53d4d40f115fd9b4521c4f31c2455e0ecebd14a7866a29f1
                                            • Instruction ID: 4d07426b438d5a643106e06cb3f0af9bcaf88119768796b1484f0f1dca707ab7
                                            • Opcode Fuzzy Hash: 072bbc43a9d6c92f53d4d40f115fd9b4521c4f31c2455e0ecebd14a7866a29f1
                                            • Instruction Fuzzy Hash: EDA002D76AD123BC321872617F07D3B021DD9CAFA13718E5EF542C5482F8899D891A76
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: b3f3a0dc6c161acbc3ce150fc88bf900147e3c130d91bae2ac6ea97190d8d8c8
                                            • Instruction ID: 4d07426b438d5a643106e06cb3f0af9bcaf88119768796b1484f0f1dca707ab7
                                            • Opcode Fuzzy Hash: b3f3a0dc6c161acbc3ce150fc88bf900147e3c130d91bae2ac6ea97190d8d8c8
                                            • Instruction Fuzzy Hash: EDA002D76AD123BC321872617F07D3B021DD9CAFA13718E5EF542C5482F8899D891A76
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84918
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: ec3a7bda9b3e1ca149b7379b39ae556f6b675217851818f3b87affd5610db354
                                            • Instruction ID: 4d07426b438d5a643106e06cb3f0af9bcaf88119768796b1484f0f1dca707ab7
                                            • Opcode Fuzzy Hash: ec3a7bda9b3e1ca149b7379b39ae556f6b675217851818f3b87affd5610db354
                                            • Instruction Fuzzy Hash: EDA002D76AD123BC321872617F07D3B021DD9CAFA13718E5EF542C5482F8899D891A76
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 4f23af990a4c5dacb408b0c938466d77a02e7bd9ce3fd0d124948ee6d5c66b13
                                            • Instruction ID: f4b0aff05127a5667ff04e496ac27bbb9d93354a3baeb0a98af23863bf8b6967
                                            • Opcode Fuzzy Hash: 4f23af990a4c5dacb408b0c938466d77a02e7bd9ce3fd0d124948ee6d5c66b13
                                            • Instruction Fuzzy Hash: 52A002E73AD123BC310872566F17E3B125DC9C7F61331AA1FF542C5086E884AC891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: c1f3289618e74e019393a0d03956175f1c2058df362a422d9de9ea79a95c39b5
                                            • Instruction ID: f4b0aff05127a5667ff04e496ac27bbb9d93354a3baeb0a98af23863bf8b6967
                                            • Opcode Fuzzy Hash: c1f3289618e74e019393a0d03956175f1c2058df362a422d9de9ea79a95c39b5
                                            • Instruction Fuzzy Hash: 52A002E73AD123BC310872566F17E3B125DC9C7F61331AA1FF542C5086E884AC891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: c88837e9eae07fa6bac25b7cd827fe8bf01fab2c8c24bcc5b7283ca230fa5a2f
                                            • Instruction ID: f4b0aff05127a5667ff04e496ac27bbb9d93354a3baeb0a98af23863bf8b6967
                                            • Opcode Fuzzy Hash: c88837e9eae07fa6bac25b7cd827fe8bf01fab2c8c24bcc5b7283ca230fa5a2f
                                            • Instruction Fuzzy Hash: 52A002E73AD123BC310872566F17E3B125DC9C7F61331AA1FF542C5086E884AC891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: be37b0c65576be048395f5479a7b7ba04f0b68bbe7b7421cde57672aa2929c50
                                            • Instruction ID: f4b0aff05127a5667ff04e496ac27bbb9d93354a3baeb0a98af23863bf8b6967
                                            • Opcode Fuzzy Hash: be37b0c65576be048395f5479a7b7ba04f0b68bbe7b7421cde57672aa2929c50
                                            • Instruction Fuzzy Hash: 52A002E73AD123BC310872566F17E3B125DC9C7F61331AA1FF542C5086E884AC891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 4bdfdf87163fcfef833e72ff6c819cec161ab392cb767d0cb31fa670a44aaf80
                                            • Instruction ID: f4b0aff05127a5667ff04e496ac27bbb9d93354a3baeb0a98af23863bf8b6967
                                            • Opcode Fuzzy Hash: 4bdfdf87163fcfef833e72ff6c819cec161ab392cb767d0cb31fa670a44aaf80
                                            • Instruction Fuzzy Hash: 52A002E73AD123BC310872566F17E3B125DC9C7F61331AA1FF542C5086E884AC891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84B3B
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 5758000ab751c5479df0b83de02d661e5c514bcbaf25870952dec197717a012e
                                            • Instruction ID: 2db1717a2c365a4b3d911b2fe0ebdedf2a8b40370a248bac1578b34875486455
                                            • Opcode Fuzzy Hash: 5758000ab751c5479df0b83de02d661e5c514bcbaf25870952dec197717a012e
                                            • Instruction Fuzzy Hash: C0A001A62AD1227C31087256AE17E3B125DC9D2F21331A61EF541D5086A894A9891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 3a6f8dd9341a929ece24d1cc29d4e573b3f27e1f56527e22e7ba7faf9087f39a
                                            • Instruction ID: c081be51f89da6e86724c9baa708b183090221bb9f911aa1bb900cd6a53a24d6
                                            • Opcode Fuzzy Hash: 3a6f8dd9341a929ece24d1cc29d4e573b3f27e1f56527e22e7ba7faf9087f39a
                                            • Instruction Fuzzy Hash: 8DA002D76AE127FC314872536F07D3B021DC9C6F613328E1EF542C5482E8845C891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: e6b7c28c051344db3f2f434234e70e86d0b1438a048789acfdc87117aa6fbc34
                                            • Instruction ID: c081be51f89da6e86724c9baa708b183090221bb9f911aa1bb900cd6a53a24d6
                                            • Opcode Fuzzy Hash: e6b7c28c051344db3f2f434234e70e86d0b1438a048789acfdc87117aa6fbc34
                                            • Instruction Fuzzy Hash: 8DA002D76AE127FC314872536F07D3B021DC9C6F613328E1EF542C5482E8845C891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: ed8935237ad21da104da6623a0669f1983ecc494ddf33cf6d0be339437fefa35
                                            • Instruction ID: c081be51f89da6e86724c9baa708b183090221bb9f911aa1bb900cd6a53a24d6
                                            • Opcode Fuzzy Hash: ed8935237ad21da104da6623a0669f1983ecc494ddf33cf6d0be339437fefa35
                                            • Instruction Fuzzy Hash: 8DA002D76AE127FC314872536F07D3B021DC9C6F613328E1EF542C5482E8845C891635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84CF1
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: e413b91ef671ef97779f6407b1a13096db59c4e3c2591cba898d77c5be67fcff
                                            • Instruction ID: e88a3793771c9550e1f9fa0ae4c3c163fb2501ce7ddec59c295df0dbfcdd2fed
                                            • Opcode Fuzzy Hash: e413b91ef671ef97779f6407b1a13096db59c4e3c2591cba898d77c5be67fcff
                                            • Instruction Fuzzy Hash: C4A002DB2AE523BC31487291AF07D3B121DDAD6F653318A1EF542C5082E9855CCD1635
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84CF1
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 7be93ca9e022e0ed61dd5116e2fb122fde86afdc11a8375add182aa30f6c6241
                                            • Instruction ID: 816dad44486807cdfd3fc384d475a8e5ffbd6cb7ab5d8f3df99b85393387ae34
                                            • Opcode Fuzzy Hash: 7be93ca9e022e0ed61dd5116e2fb122fde86afdc11a8375add182aa30f6c6241
                                            • Instruction Fuzzy Hash: 2AA002DF2AE523BD31487291AF07D3B121DDAD2F25331861EF541D5082E9855CCD1675
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84C90
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 5e42dbe278d1f83c4e4641638dfe15803a374476406750cba7ca7a84b1459ec0
                                            • Instruction ID: c081be51f89da6e86724c9baa708b183090221bb9f911aa1bb900cd6a53a24d6
                                            • Opcode Fuzzy Hash: 5e42dbe278d1f83c4e4641638dfe15803a374476406750cba7ca7a84b1459ec0
                                            • Instruction Fuzzy Hash: 8DA002D76AE127FC314872536F07D3B021DC9C6F613328E1EF542C5482E8845C891635
                                            APIs
                                            • SetDlgItemTextW.USER32(?,?,?), ref: 00D61DFC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ItemText
                                            • String ID:
                                            • API String ID: 3367045223-0
                                            • Opcode ID: a62c7883ba8591df22a7a990ca2cf751dae5f010d71f5904415e124bb21b5e95
                                            • Instruction ID: 50a7f67c95dea06789a374748cddad9e0908ac0ba147061b609b7aeacb845e8b
                                            • Opcode Fuzzy Hash: a62c7883ba8591df22a7a990ca2cf751dae5f010d71f5904415e124bb21b5e95
                                            • Instruction Fuzzy Hash: 5DC0EA75508200EF8B05CB58D948D1ABBA6BB95311B518558F05486120C331D920DB62
                                            APIs
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D84CF1
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                            • String ID:
                                            • API String ID: 1269201914-0
                                            • Opcode ID: 5608d1f8e0c454f4673b5ae1854bbba4ab0044ff795d10ccc6b27dffd66f80cd
                                            • Instruction ID: e88a3793771c9550e1f9fa0ae4c3c163fb2501ce7ddec59c295df0dbfcdd2fed
                                            • Opcode Fuzzy Hash: 5608d1f8e0c454f4673b5ae1854bbba4ab0044ff795d10ccc6b27dffd66f80cd
                                            • Instruction Fuzzy Hash: C4A002DB2AE523BC31487291AF07D3B121DDAD6F653318A1EF542C5082E9855CCD1635
                                            APIs
                                            • SetEndOfFile.KERNELBASE(?,00D6D115,?,?,?,?,?,?,?), ref: 00D6E8DC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: File
                                            • String ID:
                                            • API String ID: 749574446-0
                                            • Opcode ID: f9e42e2823d46dfcc433aaf372023fd736b769756afcaa98372a730ccd83bb23
                                            • Instruction ID: 1c56473688b44c99a4dabe500afd1613915a5b2427a43195a5dc39c44844cbf1
                                            • Opcode Fuzzy Hash: f9e42e2823d46dfcc433aaf372023fd736b769756afcaa98372a730ccd83bb23
                                            • Instruction Fuzzy Hash: 25A00230211245CBDB411F72DE0970E7B6ABF426D9B59D0A9A40DC9171DB27CCB3EA51
                                            APIs
                                            • CloseHandle.KERNELBASE(?,?,00000001,00D6DE10,7889FE40,?,00000000,00D993B1,000000FF,?,00D6BEA6,?), ref: 00D6DE6B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID:
                                            • API String ID: 2962429428-0
                                            • Opcode ID: 8122f10653fd6418364e0097b879e5aa29555e941ed4b54ecb8770e942d06437
                                            • Instruction ID: 90bc1d1b543e501dbe9e4810be3e562fecff633e9dc5b54c4517df118d5ea2e1
                                            • Opcode Fuzzy Hash: 8122f10653fd6418364e0097b879e5aa29555e941ed4b54ecb8770e942d06437
                                            • Instruction Fuzzy Hash: BFF0E270941B018BD7308E24E414362B3E46B21325F084B0EE0E64A5E5C372A889DA70
                                            APIs
                                            • _wcslen.LIBCMT ref: 00D69CB1
                                              • Part of subcall function 00D6AC11: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D6AC2E
                                              • Part of subcall function 00D6AC11: GetLastError.KERNEL32 ref: 00D6AC72
                                              • Part of subcall function 00D6AC11: CloseHandle.KERNEL32(?), ref: 00D6AC81
                                              • Part of subcall function 00D62F45: _wcslen.LIBCMT ref: 00D62F50
                                            • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000001,00000080,00000000,?,00000000,?,00000001,?,00000000,00000000,?,\??\), ref: 00D69EE1
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,788A0988,00D99937,000000FF), ref: 00D69F1E
                                            • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000003,02200000,00000000,?,00000000,?,00000000,?,00000001,?,00000000,00000000), ref: 00D6A0BF
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00D6A127
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,788A0988,00D99937,000000FF), ref: 00D6A134
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,788A0988,00D99937,000000FF), ref: 00D6A14A
                                            • RemoveDirectoryW.KERNEL32(00000000,00000009,?,?,?,?,?,?,?,?,?,788A0988,00D99937,000000FF), ref: 00D6A18E
                                            • DeleteFileW.KERNEL32(00000000,00000009,?,?,?,?,?,?,?,?,?,788A0988,00D99937,000000FF), ref: 00D6A196
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CloseFileHandle_wcslen$CreateErrorLast$ControlCurrentDeleteDeviceDirectoryProcessRemove
                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                            • API String ID: 3517300771-3508440684
                                            • Opcode ID: e1053a42ad8bfd3da7f94204b7e61718547791b87fb1413632286856ab43187d
                                            • Instruction ID: 73b47f554edb2c5f24c335f99171e08959893e5165ef60357276f85514afadfd
                                            • Opcode Fuzzy Hash: e1053a42ad8bfd3da7f94204b7e61718547791b87fb1413632286856ab43187d
                                            • Instruction Fuzzy Hash: 8C326F759002889FDB24DFA8CC91BEE77F9EF15314F14416AE849E7281DB34AA48CB71
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D8163A
                                              • Part of subcall function 00D61E44: GetDlgItem.USER32(00000000,00003021), ref: 00D61E88
                                              • Part of subcall function 00D61E44: SetWindowTextW.USER32(00000000,00D9C6C8), ref: 00D61E9E
                                            • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00D816BB
                                            • EndDialog.USER32(?,00000006), ref: 00D816CE
                                            • GetDlgItem.USER32(?,0000006C), ref: 00D816EA
                                            • SetFocus.USER32(00000000), ref: 00D816F1
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                              • Part of subcall function 00D61DE7: SetDlgItemTextW.USER32(?,?,?), ref: 00D61DFC
                                            • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00D81763
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00D81783
                                            • FindClose.KERNEL32(00000000,?,00000000,00000000,00000000,00000099,?,?,00000000), ref: 00D81826
                                            • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00D818AD
                                              • Part of subcall function 00D61150: _wcslen.LIBCMT ref: 00D6115B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Item$MessageSend$FindText_wcslen$CloseDialogFileFirstFocusH_prolog3_Window
                                            • String ID: %s %s$REPLACEFILEDLG
                                            • API String ID: 485132379-439456425
                                            • Opcode ID: 820dfa34b4d8812c32ec87cc34fedc6e1acb8e2140b0296f3860fd8f0fd363b8
                                            • Instruction ID: 2f12c5eaaba6f26ad9e42d0be81698cc1b4042681980503dd7f8a0e4f0197caf
                                            • Opcode Fuzzy Hash: 820dfa34b4d8812c32ec87cc34fedc6e1acb8e2140b0296f3860fd8f0fd363b8
                                            • Instruction Fuzzy Hash: DDA18D75940218EBDB21FBA0CC4AFEEB77DEF15300F044195B249A3182EA759B498F71
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: __floor_pentium4
                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                            • API String ID: 4168288129-2761157908
                                            • Opcode ID: ecd30e2b40e874bdba4c86c6597378e3200fa0b7a64cd0a411f04a22a491bccb
                                            • Instruction ID: 5d1a27dc953b2b792ac9502f43a2663c0cd5494d6079e292930ad5bb323810fb
                                            • Opcode Fuzzy Hash: ecd30e2b40e874bdba4c86c6597378e3200fa0b7a64cd0a411f04a22a491bccb
                                            • Instruction Fuzzy Hash: A8C24B71E046298FDF25CE28ED40BEAB7B5EB44305F1841EAD84DE7245E774AE818F60
                                            APIs
                                            • _strlen.LIBCMT ref: 00D6438C
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00D64523
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_strlen
                                            • String ID: CMT
                                            • API String ID: 2172594012-2756464174
                                            • Opcode ID: e4d83e7e5e3face104551abe4ddf8ade88cdc46002996ec5d68f8473aa90dbc1
                                            • Instruction ID: 21e6651f69e420ef86ff9d1d74aab1d1bdfbc447338ec06f533d541dc9e7d45a
                                            • Opcode Fuzzy Hash: e4d83e7e5e3face104551abe4ddf8ade88cdc46002996ec5d68f8473aa90dbc1
                                            • Instruction Fuzzy Hash: DF72C071A003448FDB18DF68C8957EA7BA1FF59300F08857EEC5A9B282DB74A945CB71
                                            APIs
                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00D86884
                                            • IsDebuggerPresent.KERNEL32 ref: 00D86950
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D86970
                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00D8697A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                            • String ID:
                                            • API String ID: 254469556-0
                                            • Opcode ID: d09458605392dfe0bb17cdb8205fdaef0649db77676414e37c94d6b1f3528ad1
                                            • Instruction ID: 645a5a446a65bea02d16d718b369afb6745d646cf4e6f0388ac900819b5ed607
                                            • Opcode Fuzzy Hash: d09458605392dfe0bb17cdb8205fdaef0649db77676414e37c94d6b1f3528ad1
                                            • Instruction Fuzzy Hash: 1E312975D453189BDB11EFA4D989BCCBBB8FF08304F1051EAE40CAB250EB719A848F64
                                            APIs
                                            • GetLastError.KERNEL32(?,?,00D6952D,?,00000040,00D6931E,00000001,?,?,?,?,0000001C,00D77618,00DAE0C8,WaitForMultipleObjects error %d, GetLastError %d,000000FF), ref: 00D69330
                                            • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,00000000,00000000,00000000,?,?,00D6952D,?,00000040,00D6931E,00000001,?,?), ref: 00D69351
                                            • _wcslen.LIBCMT ref: 00D69360
                                            • LocalFree.KERNEL32(00000000,00000000,00000000,00DAE0C8,?,?,00D6952D,?,00000040,00D6931E,00000001,?,?,?,?,0000001C), ref: 00D69373
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorFormatFreeLastLocalMessage_wcslen
                                            • String ID:
                                            • API String ID: 991192900-0
                                            • Opcode ID: 321081c986e6b0edf7e3ff1728f29a7f0be36708e1237d77f8e608932f5144d1
                                            • Instruction ID: 138d728c1f305d440bfc6ed9ef1402701f8b1d280243d4c8e9f672fc413b3920
                                            • Opcode Fuzzy Hash: 321081c986e6b0edf7e3ff1728f29a7f0be36708e1237d77f8e608932f5144d1
                                            • Instruction Fuzzy Hash: BDF08279510304FBEB04EBA19D05EFF776CEB85740B14801AF502E6290CA709E01D678
                                            APIs
                                            • VirtualQuery.KERNEL32(80000000,00D84D59,0000001C,00D84F4E,00000000,?,?,?,?,?,?,?,00D84D59,00000004,00DB5D84,00D84FDE), ref: 00D84E25
                                            • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00D84D59,00000004,00DB5D84,00D84FDE), ref: 00D84E40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: InfoQuerySystemVirtual
                                            • String ID: D
                                            • API String ID: 401686933-2746444292
                                            • Opcode ID: 3d4830026248ed07192c3bfbd6cea7e898e37cab51fc70f9bdf80cb177c0f7a1
                                            • Instruction ID: 2fe7f1ae7e419cd48c3c36707c40d283fbc180c5483d7391c493da57f58daa6d
                                            • Opcode Fuzzy Hash: 3d4830026248ed07192c3bfbd6cea7e898e37cab51fc70f9bdf80cb177c0f7a1
                                            • Instruction Fuzzy Hash: C401A7726002096BDB14EE29DC05BEE7BA9AFC4328F0CC125FD59DB255DB34D91187A0
                                            APIs
                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00D8535E), ref: 00D8ABBC
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00D8535E), ref: 00D8ABC6
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00D8535E), ref: 00D8ABD3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                            • String ID:
                                            • API String ID: 3906539128-0
                                            • Opcode ID: c786d5b1176b05f65e6db2530f370076fe6ae7f18445f021f9a0302909d14a23
                                            • Instruction ID: c34b57628833ce4852267e2c1dcf109bd8a6834346e947bb5abce70a7ed392e0
                                            • Opcode Fuzzy Hash: c786d5b1176b05f65e6db2530f370076fe6ae7f18445f021f9a0302909d14a23
                                            • Instruction Fuzzy Hash: 2B31C2749013189BCB21EF68D988B98BBB8EF08310F5051DAE41CA7261EB749F818F65
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .
                                            • API String ID: 0-248832578
                                            • Opcode ID: 2c947078abe9e32b7e2f8a03f1d9ad9cd5ced6d2afea07bceeba9960f70216dd
                                            • Instruction ID: 62f7fe7b0cde210a4584e0c3545cef74dbc363b5a1e89b2abd86edc0c8727de4
                                            • Opcode Fuzzy Hash: 2c947078abe9e32b7e2f8a03f1d9ad9cd5ced6d2afea07bceeba9960f70216dd
                                            • Instruction Fuzzy Hash: 5931CF72900209BBDF249E78CC84EFABBADDB85314F1802A9F91997251E6319E45CB70
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e76feb55238aef6f2104d7f35b4c35741b7a6e088d7c6c091e67f68abddc892
                                            • Instruction ID: 03fd03a356302baefa269de03f9f8195a01234046aa77fbbe18c15356539d8e0
                                            • Opcode Fuzzy Hash: 9e76feb55238aef6f2104d7f35b4c35741b7a6e088d7c6c091e67f68abddc892
                                            • Instruction Fuzzy Hash: DC024D71E002199FDF14CFA9C980AAEB7F1EF49314F298269D919E7345D731AD42CBA0
                                            APIs
                                            • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00D7FD6A
                                            • GetNumberFormatW.KERNEL32(00000400,00000000,?,00DA9714,?,?), ref: 00D7FDB3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FormatInfoLocaleNumber
                                            • String ID:
                                            • API String ID: 2169056816-0
                                            • Opcode ID: 038770f95a0dd1203547ba039ba503bcbdd95688ec1fc8f28e8583bbb9ff0616
                                            • Instruction ID: a260fbb103e6a0bb6efc943ea6dfb7e56d53b739108c47bdc54c40fcfce33cb5
                                            • Opcode Fuzzy Hash: 038770f95a0dd1203547ba039ba503bcbdd95688ec1fc8f28e8583bbb9ff0616
                                            • Instruction Fuzzy Hash: A7115E79220358EBDB10DF64EC41BEAB7F8EF08700F00542AB506E72A1E670A908C779
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CMT
                                            • API String ID: 0-2756464174
                                            • Opcode ID: 9f0853d474702c545f76524ae7ab0b7827423d7165e416e8ded84dd0c8be457e
                                            • Instruction ID: c768c4291605997a690512d857f8195f8e45dfad1ac3f6787d4a1a1a07b45322
                                            • Opcode Fuzzy Hash: 9f0853d474702c545f76524ae7ab0b7827423d7165e416e8ded84dd0c8be457e
                                            • Instruction Fuzzy Hash: D5629371A00649AFDF08DF64C891BED7BA4FF19314F088179EC499B286DB74A944CBB1
                                            APIs
                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D986CD,?,?,00000008,?,?,00D9836D,00000000), ref: 00D988FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ExceptionRaise
                                            • String ID:
                                            • API String ID: 3997070919-0
                                            • Opcode ID: bab2bb2ac01626aad8300aab1f70b582045885efeeab642d8c63cf94212cd8ed
                                            • Instruction ID: be2bbff96e40626dc74f9e3ea761b1c1e6a03dcbd49ae50d39c9bf53a918c5e5
                                            • Opcode Fuzzy Hash: bab2bb2ac01626aad8300aab1f70b582045885efeeab642d8c63cf94212cd8ed
                                            • Instruction Fuzzy Hash: 7DB15B316106089FDB15CF28C48AB647BE0FF46764F698658E8DACF2A1C735D982DF50
                                            APIs
                                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00D866AA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FeaturePresentProcessor
                                            • String ID:
                                            • API String ID: 2325560087-0
                                            • Opcode ID: bc6978c7b5cecfccaed81bb5ebb7104ced232a1df207145c102abf382a775991
                                            • Instruction ID: 9d3042a918622be3d1a19670c165c0367676271490326913b9209a85e1c67194
                                            • Opcode Fuzzy Hash: bc6978c7b5cecfccaed81bb5ebb7104ced232a1df207145c102abf382a775991
                                            • Instruction Fuzzy Hash: EC517BB2911305CFEB14CF59D8856AABBF0FB44324F28896AD505EB391D375D940CBB0
                                            APIs
                                            • GetVersionExW.KERNEL32(?), ref: 00D703ED
                                              • Part of subcall function 00D70469: __EH_prolog3.LIBCMT ref: 00D70470
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3Version
                                            • String ID:
                                            • API String ID: 2775145068-0
                                            • Opcode ID: c41cebf7d1075b57f4d1104fec50ffbc3064817ed3a99ad54081d8333fcdba6b
                                            • Instruction ID: ac09ec2879543fe0c6dc467ba1891293e715b7cca9a2128ea5468bf97b538f00
                                            • Opcode Fuzzy Hash: c41cebf7d1075b57f4d1104fec50ffbc3064817ed3a99ad54081d8333fcdba6b
                                            • Instruction Fuzzy Hash: 12F08C30804348CAEB24DF74EC197E87FA0AB1234CF448469D64AA7392E7B8848DCB31
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: gj
                                            • API String ID: 0-4203073231
                                            • Opcode ID: 52c1349138ac8b719603e7acdcf6a0a177ce02469cd2d4541116033aa9d04224
                                            • Instruction ID: e3cb9efae16194e40d51096bc9eea6ff44d15540729e781bebaf8a7c4cb8c185
                                            • Opcode Fuzzy Hash: 52c1349138ac8b719603e7acdcf6a0a177ce02469cd2d4541116033aa9d04224
                                            • Instruction Fuzzy Hash: ADD138B2A183458FC354CF69D88065AFBE2BFC9308F59492DE998D7301D734A949CF92
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00026A20,00D86445), ref: 00D86A10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 4f4455ae3edc5dfa79701489de5c65ec84c515077f1dffc9caeff897e72b72d8
                                            • Instruction ID: e3acb42983734f373db860ee31486970858c85a687d704546702177864482ab0
                                            • Opcode Fuzzy Hash: 4f4455ae3edc5dfa79701489de5c65ec84c515077f1dffc9caeff897e72b72d8
                                            • Instruction Fuzzy Hash:
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: HeapProcess
                                            • String ID:
                                            • API String ID: 54951025-0
                                            • Opcode ID: f1f6fc93eacf4d30e87fb156920e673049094201f21af62c4ef053fe7ac156d0
                                            • Instruction ID: ce300679d4691974ec481ed1f56295035414bb45b9d71a1994e7a2bd1d253b65
                                            • Opcode Fuzzy Hash: f1f6fc93eacf4d30e87fb156920e673049094201f21af62c4ef053fe7ac156d0
                                            • Instruction Fuzzy Hash: 15A02230202300CFAB008F30AF0830E3AE8FE002C0388802EB00ACA330EF38C000CB20
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3656517a269937d65cae0d8ec39795bb2ba0f8e7439345b18be7eaed4085f102
                                            • Instruction ID: 44e7de373bf7de29ca5fd1f770b8d8ad3f6428cca72126beae4592616e86f418
                                            • Opcode Fuzzy Hash: 3656517a269937d65cae0d8ec39795bb2ba0f8e7439345b18be7eaed4085f102
                                            • Instruction Fuzzy Hash: 3882E4356047859FCB29CF28C4907BABBE1AF95314F18C95ED8DE8B346E730A945CB21
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d5dc683f424ca3e3b90f170d092ddfbd13c5edb0810bc368677be806e2779c3
                                            • Instruction ID: ef5f8180afda5658aa7310ce95f186419c8d72046ec33939e4488fda3adee525
                                            • Opcode Fuzzy Hash: 7d5dc683f424ca3e3b90f170d092ddfbd13c5edb0810bc368677be806e2779c3
                                            • Instruction Fuzzy Hash: 3E823C65D39F895EE3039A3884021E7F3A86EF71C9F46E71FF8A431526E721A6C75201
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 957e3e4f770764865b5c084bd61d322db280cc563c89754f50ffbe7270592e0c
                                            • Instruction ID: 85ab1a4974e9a951b1db97effd0775542f023f2958dfcc0990eee0037de3a188
                                            • Opcode Fuzzy Hash: 957e3e4f770764865b5c084bd61d322db280cc563c89754f50ffbe7270592e0c
                                            • Instruction Fuzzy Hash: 0C72F3716143858FCB19CF6CC8906A9BBE2BF95304F18D56DE89E8B346E730E945CB21
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 605082976fd6bcb660ea90b2928608d33a4af8ea1a4694150b2d300d36c2867c
                                            • Instruction ID: c5362454c6730695338d775638d58e292890981a01a052cd0bbe2659252d6224
                                            • Opcode Fuzzy Hash: 605082976fd6bcb660ea90b2928608d33a4af8ea1a4694150b2d300d36c2867c
                                            • Instruction Fuzzy Hash: 4C524B72A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d13b0eb2895bc5e597969e36ed56e0313cb298e28c21dcaadfb5e4361172a7d2
                                            • Instruction ID: b53059bb05afbe2d6bbfcb13efb3fa5f97315ac846fd84ec77dab44da93a21b0
                                            • Opcode Fuzzy Hash: d13b0eb2895bc5e597969e36ed56e0313cb298e28c21dcaadfb5e4361172a7d2
                                            • Instruction Fuzzy Hash: DF12D1706147068FD728CF28C891BB9B7E0FF54318F14892EE89AC7281E774E995CB65
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f78205abfc10fe48b6bf866e955dab9830ad473c26cf3a3535fd3e9520843539
                                            • Instruction ID: 49622a32986ffc4dcd2905f189388fb07e8f8ef8885208d1d0385091b5302f41
                                            • Opcode Fuzzy Hash: f78205abfc10fe48b6bf866e955dab9830ad473c26cf3a3535fd3e9520843539
                                            • Instruction Fuzzy Hash: 3FE13BB5908390DFC344CF29D49046ABBF0AB99300F464A6EF5D497352D335EA16DFA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c88b65260b2f4f112facfb1ecb65f78ae03855b8e125f13aee392aa49e2464a
                                            • Instruction ID: c81b7e8ec90fd055ce166e4e42c7b165fa687176455d4aab1f1732fd2e28eaf3
                                            • Opcode Fuzzy Hash: 0c88b65260b2f4f112facfb1ecb65f78ae03855b8e125f13aee392aa49e2464a
                                            • Instruction Fuzzy Hash: 0F9112312083414BD725DF6CD885BAE77D2EBD0308F14892DE9CE8B282E675D8858773
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a92f22a004291f93a7c43976e4c0fa1cd48dd3cf5f06cc941271daece0c5d8b
                                            • Instruction ID: 8ce78b33a1c858bb379e539970f8bfa44f9ebca51c700c9dfd5cd28b7e585410
                                            • Opcode Fuzzy Hash: 0a92f22a004291f93a7c43976e4c0fa1cd48dd3cf5f06cc941271daece0c5d8b
                                            • Instruction Fuzzy Hash: 46617C71630708D6DE34BAB858D9BBE7398DF05B04F58341AE882DB2C2D635DD468379
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                            • Instruction ID: b133d2e6fb37467ad95a765e286d61ade3ef08bc0962a08c6cdc2572595c4833
                                            • Opcode Fuzzy Hash: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                            • Instruction Fuzzy Hash: 9C517861210745DADF35B92888567FF2B99DF02360F1C155BEA82C7782C726ED05C735
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 90ac09e1220197574b8c1f088bad7bbff7d7e0b3297a68e67d70a1fb8b834b12
                                            • Instruction ID: 5b011d79faf294728ec59180bef2523457fc40be2c22edfd16a72b2d1d5cc432
                                            • Opcode Fuzzy Hash: 90ac09e1220197574b8c1f088bad7bbff7d7e0b3297a68e67d70a1fb8b834b12
                                            • Instruction Fuzzy Hash: 9251E5315083954FC712DF28C5505AEFFE0AEDA314F4A8999F4E95B242E331DA4ACB72
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2da4a09a5690c38a7539a49b275772a51fcc381439fac3e469f37f25632b4c50
                                            • Instruction ID: 087869adcb7be947d717d71b495a5dd79771f6066e0459cb8cb06e6af96229af
                                            • Opcode Fuzzy Hash: 2da4a09a5690c38a7539a49b275772a51fcc381439fac3e469f37f25632b4c50
                                            • Instruction Fuzzy Hash: 7051DDB1A087119FC758CF29D88055AF7E1FF88314F058A2EF899E7340DB30E9598B96
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 05051f28e1c7025b01332903b260566e0dad3863efea20ce7ce926dc4f85ab64
                                            • Instruction ID: e51b8c65e337ad15a44df1563e6697e3bf8566e6a4f1a1a40431c6d19f63856c
                                            • Opcode Fuzzy Hash: 05051f28e1c7025b01332903b260566e0dad3863efea20ce7ce926dc4f85ab64
                                            • Instruction Fuzzy Hash: B53112B1614B068FCB14DF28C85116EBBE1FB95304F148A2DE8DAC3342D335E809CBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: df13c561cf512fd72e314f0c8c275dfb4e9792f9b659da3cf5682587dc4af2d2
                                            • Instruction ID: c8571ab5f0f197b931409a9fa9715cf880c340b01122bfa278b845ed701ae9cd
                                            • Opcode Fuzzy Hash: df13c561cf512fd72e314f0c8c275dfb4e9792f9b659da3cf5682587dc4af2d2
                                            • Instruction Fuzzy Hash: D041F930505B15CFC71ADF38D4559A6B7E0FF8A704B1248AFD06A8B221EB30E604DF69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                            • Instruction ID: 406873f0a5518e838752d5893d61fa0909871e47fae60b5532392fa6c8954e0b
                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                            • Instruction Fuzzy Hash: 0E1190B720014243D605A67ED4F46FBE399FBC6321B6C437AE0C34B7D8D222E941AB20
                                            APIs
                                            • _swprintf.LIBCMT ref: 00D73EEA
                                              • Part of subcall function 00D6F6BA: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00D6F6CD
                                              • Part of subcall function 00D789ED: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000050,?,00000000,00000000,00DAE088,?,00000007,00D733E2,?,?,00000050,7889FE40), ref: 00D78A0A
                                            • _strlen.LIBCMT ref: 00D73F0B
                                            • SetDlgItemTextW.USER32(?,00DA919C,?), ref: 00D73F64
                                            • GetWindowRect.USER32(?,?), ref: 00D73F9A
                                            • GetClientRect.USER32(?,?), ref: 00D73FA6
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00D74051
                                            • GetWindowRect.USER32(?,?), ref: 00D74081
                                            • SetWindowTextW.USER32(?,?), ref: 00D740B0
                                            • GetSystemMetrics.USER32(00000008), ref: 00D740B8
                                            • GetWindow.USER32(?,00000005), ref: 00D740C3
                                            • GetWindowRect.USER32(00000000,?), ref: 00D740F3
                                            • GetWindow.USER32(00000000,00000002), ref: 00D74165
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                            • String ID: $%s:$CAPTION$d
                                            • API String ID: 2407758923-2512411981
                                            • Opcode ID: 80ef92bef7c2842039c71744e2453572ae03d72f1ec6909952f36b708c65b203
                                            • Instruction ID: 4d70305f6485d88f9234b4061a948c374ed1d44d02dcfe8e151c632aa4f78366
                                            • Opcode Fuzzy Hash: 80ef92bef7c2842039c71744e2453572ae03d72f1ec6909952f36b708c65b203
                                            • Instruction Fuzzy Hash: 6C817B72508301EFD715DF68CD89A6BBBE9EB89704F04591DF989D3290E730E909CB62
                                            APIs
                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(00DB60E0,00000FA0,?,?,00D86185), ref: 00D861B3
                                            • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00D86185), ref: 00D861BE
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00D86185), ref: 00D861CF
                                            • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00D861E1
                                            • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00D861EF
                                            • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00D86185), ref: 00D86212
                                            • DeleteCriticalSection.KERNEL32(00DB60E0,00000007,?,?,00D86185), ref: 00D86235
                                            • CloseHandle.KERNEL32(00000000,?,?,00D86185), ref: 00D86245
                                            Strings
                                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00D861B9
                                            • kernel32.dll, xrefs: 00D861CA
                                            • SleepConditionVariableCS, xrefs: 00D861DB
                                            • WakeAllConditionVariable, xrefs: 00D861E7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                            • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                            • API String ID: 2565136772-3242537097
                                            • Opcode ID: a0ee091f60b588f050a74b6c1653107ef04fff93d5971f7f05e2a17e9b6940a1
                                            • Instruction ID: dd205647b4cc000b23dd4a28c313b80dc30a8c7651f5b5542f96c26e7d270eb6
                                            • Opcode Fuzzy Hash: a0ee091f60b588f050a74b6c1653107ef04fff93d5971f7f05e2a17e9b6940a1
                                            • Instruction Fuzzy Hash: 0901A771E50711EFDB207B76AC0DF563B68EB44B51F084562FD1ED2350EA64C8008B71
                                            APIs
                                            • ___free_lconv_mon.LIBCMT ref: 00D93816
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D933CE
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D933E0
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D933F2
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D93404
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D93416
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D93428
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D9343A
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D9344C
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D9345E
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D93470
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D93482
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D93494
                                              • Part of subcall function 00D933B1: _free.LIBCMT ref: 00D934A6
                                            • _free.LIBCMT ref: 00D9380B
                                              • Part of subcall function 00D903D4: RtlFreeHeap.NTDLL(00000000,00000000,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?), ref: 00D903EA
                                              • Part of subcall function 00D903D4: GetLastError.KERNEL32(?,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?,?), ref: 00D903FC
                                            • _free.LIBCMT ref: 00D9382D
                                            • _free.LIBCMT ref: 00D93842
                                            • _free.LIBCMT ref: 00D9384D
                                            • _free.LIBCMT ref: 00D9386F
                                            • _free.LIBCMT ref: 00D93882
                                            • _free.LIBCMT ref: 00D93890
                                            • _free.LIBCMT ref: 00D9389B
                                            • _free.LIBCMT ref: 00D938D3
                                            • _free.LIBCMT ref: 00D938DA
                                            • _free.LIBCMT ref: 00D938F7
                                            • _free.LIBCMT ref: 00D9390F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                            • String ID:
                                            • API String ID: 161543041-0
                                            • Opcode ID: 92f63002e25cb5221f3e549bf817017e5a40b17640556188d3f0a0a4cb7a2bc2
                                            • Instruction ID: 3970cd2f5f170515cbddd208b8e5c00fdd73d0f2b1f2cd3f0ab5ff262f3d5a20
                                            • Opcode Fuzzy Hash: 92f63002e25cb5221f3e549bf817017e5a40b17640556188d3f0a0a4cb7a2bc2
                                            • Instruction Fuzzy Hash: 05317E316043049FEF21AA79E845B6AB7E9EF00310F194529F458E7651DFB2EE84CB70
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D7D919
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                            • _wcslen.LIBCMT ref: 00D7D97B
                                            • _wcslen.LIBCMT ref: 00D7D99A
                                            • _wcslen.LIBCMT ref: 00D7D9B6
                                            • _strlen.LIBCMT ref: 00D7DA14
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,00D9D9F0,00000000,?,00000000,?,<html>,00000006,<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>,?), ref: 00D7DA2D
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 00D7DA54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _wcslen$Global$AllocCreateH_prolog3_Stream_strlen
                                            • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                            • API String ID: 1185167184-1533471033
                                            • Opcode ID: dda015fba82f1184cd5dcfbfa92648f95b84980212646d4db8f4d5950c259866
                                            • Instruction ID: 2fc8c771150922eea99c13bdbb873567751c7c796c12f454d74b790dce8af64f
                                            • Opcode Fuzzy Hash: dda015fba82f1184cd5dcfbfa92648f95b84980212646d4db8f4d5950c259866
                                            • Instruction Fuzzy Hash: D3514F71D00218AFEB04EBA4CD46BEEBBB9EF55310F144019E509BB285EB705E45CBB5
                                            APIs
                                            • GetWindow.USER32(?,00000005), ref: 00D837C4
                                            • GetClassNameW.USER32(00000000,?,00000080), ref: 00D837F0
                                              • Part of subcall function 00D78DA4: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,00D70E3F,?,?,?,00000046,00D71ECE,00000046,?,exe,00000046), ref: 00D78DBA
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00D8380C
                                            • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00D83823
                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 00D83837
                                            • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00D83860
                                            • DeleteObject.GDI32(00000000), ref: 00D83867
                                            • GetWindow.USER32(00000000,00000002), ref: 00D83870
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                            • String ID: STATIC
                                            • API String ID: 3820355801-1882779555
                                            • Opcode ID: aee3f970e8b1e5dae8a9709ec653b7b9d5c91bd3eb20052f4e40b2c8d802eccb
                                            • Instruction ID: d67c93e3c6a50177edd3297002ab2af7c0b7d3a1fad01ef416e4a0e5a27d24d8
                                            • Opcode Fuzzy Hash: aee3f970e8b1e5dae8a9709ec653b7b9d5c91bd3eb20052f4e40b2c8d802eccb
                                            • Instruction Fuzzy Hash: E021D072548710FBE620BB24DC4AFEF77ACEF89B50F044625FA09E62D1EB60890547B5
                                            APIs
                                            • _free.LIBCMT ref: 00D8FF25
                                              • Part of subcall function 00D903D4: RtlFreeHeap.NTDLL(00000000,00000000,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?), ref: 00D903EA
                                              • Part of subcall function 00D903D4: GetLastError.KERNEL32(?,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?,?), ref: 00D903FC
                                            • _free.LIBCMT ref: 00D8FF31
                                            • _free.LIBCMT ref: 00D8FF3C
                                            • _free.LIBCMT ref: 00D8FF47
                                            • _free.LIBCMT ref: 00D8FF52
                                            • _free.LIBCMT ref: 00D8FF5D
                                            • _free.LIBCMT ref: 00D8FF68
                                            • _free.LIBCMT ref: 00D8FF73
                                            • _free.LIBCMT ref: 00D8FF7E
                                            • _free.LIBCMT ref: 00D8FF8C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 0b7495241e2e44433e2e3e1baf8602d4182d2284d2411714dcff3ed85358d1f8
                                            • Instruction ID: 7093fe61ee9851fe0f2b5634dec65068908376edbec2cd3297abe10c00d9b1f3
                                            • Opcode Fuzzy Hash: 0b7495241e2e44433e2e3e1baf8602d4182d2284d2411714dcff3ed85358d1f8
                                            • Instruction Fuzzy Hash: 2011427651414CBFCF41EF94D942CDD3FA9EF08350B5142A5BA089B262DA72EA50DBA0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                            • String ID: csm$csm$csm
                                            • API String ID: 322700389-393685449
                                            • Opcode ID: 42d1d3174de12b18ff4bc7a47cc562995f9deba557a7b4219cb9983d1df1df75
                                            • Instruction ID: afa02be2d7da55db3c9ee9bc3529376d133d5b038b1bb51fc4044255efcbb80f
                                            • Opcode Fuzzy Hash: 42d1d3174de12b18ff4bc7a47cc562995f9deba557a7b4219cb9983d1df1df75
                                            • Instruction Fuzzy Hash: 3FB14775800209EFCF15EFA8D9A19BEFBB5EF04310B1C445AE8856B212D731EA51CBB5
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6D99A
                                            • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00D6D9BF
                                            • GetLongPathNameW.KERNEL32(?,?,?), ref: 00D6DA11
                                            • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 00D6DA34
                                            • GetShortPathNameW.KERNEL32(?,?,?), ref: 00D6DA84
                                            • MoveFileW.KERNEL32(-00000040,-00000028), ref: 00D6DC9F
                                            • MoveFileW.KERNEL32(-00000028,-00000040), ref: 00D6DCEC
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: NamePath$FileLongMoveShort$H_prolog3__wcslen
                                            • String ID: rtmp
                                            • API String ID: 2388273531-870060881
                                            • Opcode ID: 6f0e4eb42678ba550065cfcc23222a85f0ad9acb47844f3d7ce231a7121d3c05
                                            • Instruction ID: 69de4feb98850c8ea5f652052fd4f6a431bdea94f8314316cc2618abfe63565f
                                            • Opcode Fuzzy Hash: 6f0e4eb42678ba550065cfcc23222a85f0ad9acb47844f3d7ce231a7121d3c05
                                            • Instruction Fuzzy Hash: B1B1E570E01258DBCF20EFA8DC85ADDBBB9AF59305F484099E449A7251DB309B89CF70
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3__wcslen
                                            • String ID: .rar$exe$rar$sfx
                                            • API String ID: 3251556500-630704357
                                            • Opcode ID: 1ae9ed0aef0ae8e1bfd8a7faf1256881e5867e24ea86a83dc67e00c793fa3f84
                                            • Instruction ID: 025054f08d3b6c2dee9f481d125fc7014820ae6865fcc95695aacea061f1124d
                                            • Opcode Fuzzy Hash: 1ae9ed0aef0ae8e1bfd8a7faf1256881e5867e24ea86a83dc67e00c793fa3f84
                                            • Instruction Fuzzy Hash: F571E435A007509BCB21EFACC941ABDB7F4EF48B10F64861EF4899B291EB719946C770
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00D704AB,00D704AD,00000000,00000000,7889FE40,00000001,00000000,00000000,?,00D7038C,?,00000004,00D704AB,ROOT\CIMV2), ref: 00D85459
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00D704AB,?,00000000,00000000,?,?,00D7038C,?,00000004,00D704AB), ref: 00D854D4
                                            • SysAllocString.OLEAUT32(00000000), ref: 00D854DF
                                            • _com_issue_error.COMSUPP ref: 00D85508
                                            • _com_issue_error.COMSUPP ref: 00D85512
                                            • GetLastError.KERNEL32(80070057,7889FE40,00000001,00000000,00000000,?,00D7038C,?,00000004,00D704AB,ROOT\CIMV2), ref: 00D85517
                                            • _com_issue_error.COMSUPP ref: 00D8552A
                                            • GetLastError.KERNEL32(00000000,?,00D7038C,?,00000004,00D704AB,ROOT\CIMV2), ref: 00D85540
                                            • _com_issue_error.COMSUPP ref: 00D85553
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                            • String ID:
                                            • API String ID: 1353541977-0
                                            • Opcode ID: f44aa32e38320559ab5823775bf65fb807a22bdcfccf08150dfc5862f4e9b2a0
                                            • Instruction ID: 1eb61a1f25ae92c7660b242d753e4f6d16743f4606b056e1dc113bd0f4fdaca1
                                            • Opcode Fuzzy Hash: f44aa32e38320559ab5823775bf65fb807a22bdcfccf08150dfc5862f4e9b2a0
                                            • Instruction Fuzzy Hash: 8B41F571A00705ABCB10EF69EC45BAEBBA9EB48710F24426AF509E7385D734D940CBB5
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00D70470
                                              • Part of subcall function 00D70360: __EH_prolog3.LIBCMT ref: 00D70367
                                            • VariantClear.OLEAUT32(?), ref: 00D705FA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3$ClearVariant
                                            • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                            • API String ID: 4196654922-3505469590
                                            • Opcode ID: 25818f85be910b133e69bdfbfa70d3e736ab472630e828b32ff78a77988234db
                                            • Instruction ID: db221c5f3c63c5549bd114e0e9e378ba5059505493c1b06b73a71c77c85c2648
                                            • Opcode Fuzzy Hash: 25818f85be910b133e69bdfbfa70d3e736ab472630e828b32ff78a77988234db
                                            • Instruction Fuzzy Hash: F8612671A10219EFDB14DFA4CC95AAEBBB8FF88714B44415DE506E72A0DB30AD01CBB0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3_wcslen
                                            • String ID: $</p>$</style>$<br>$<style>
                                            • API String ID: 3746244732-3393513139
                                            • Opcode ID: 8b2773b9c5d39b504e674481624c1613a2ff69dd01dc998947bf27ecd7c9d7df
                                            • Instruction ID: ab60c337e34dd81e606fe6aab3d7b13a7ffea5089b17e1dc5c8faef0339f6db0
                                            • Opcode Fuzzy Hash: 8b2773b9c5d39b504e674481624c1613a2ff69dd01dc998947bf27ecd7c9d7df
                                            • Instruction Fuzzy Hash: FC510635B4031296DF309A28881277673A6EF69741F9CC099FDC9AB2C1FB758D8083B4
                                            APIs
                                              • Part of subcall function 00D61E44: GetDlgItem.USER32(00000000,00003021), ref: 00D61E88
                                              • Part of subcall function 00D61E44: SetWindowTextW.USER32(00000000,00D9C6C8), ref: 00D61E9E
                                            • EndDialog.USER32(?,00000001), ref: 00D80720
                                            • SendMessageW.USER32(?,00000080,00000001,00030431), ref: 00D80747
                                            • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,00050E00), ref: 00D80760
                                            • GetDlgItem.USER32(?,00000065), ref: 00D8077C
                                            • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00D80790
                                            • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00D807A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: MessageSend$Item$DialogTextWindow
                                            • String ID: LICENSEDLG
                                            • API String ID: 3077722735-2177901306
                                            • Opcode ID: 6bfcff4c66a1db860c958e75744a0e2b5c38211977e8521636f0dedf30cd1e42
                                            • Instruction ID: 050d0d5eae4e34fbe59e3096792e922bc7cef922e2fba7e2b7f83264303daacb
                                            • Opcode Fuzzy Hash: 6bfcff4c66a1db860c958e75744a0e2b5c38211977e8521636f0dedf30cd1e42
                                            • Instruction Fuzzy Hash: 5621B031249304FBD2517F259D4DFAB3FADEB86B86F080114F601E62A1C662AA098B75
                                            APIs
                                            • __aulldiv.LIBCMT ref: 00D7783D
                                              • Part of subcall function 00D7067E: GetVersionExW.KERNEL32(?), ref: 00D706AF
                                            • FileTimeToLocalFileTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00D77860
                                            • FileTimeToSystemTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00D77872
                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00D77883
                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D77893
                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00D778A3
                                            • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00D778DE
                                            • __aullrem.LIBCMT ref: 00D77984
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                            • String ID:
                                            • API String ID: 1247370737-0
                                            • Opcode ID: b478b4afba85515c1f123ac35aa4e4133067132be6759035f597b0a83e125d41
                                            • Instruction ID: 79c849404d95e3cc3c7bb58ed91c49e044ddbad51c1dca305c4d40e741273051
                                            • Opcode Fuzzy Hash: b478b4afba85515c1f123ac35aa4e4133067132be6759035f597b0a83e125d41
                                            • Instruction Fuzzy Hash: F05105B1508305AFD710DF65C88496BFBE9FB88714F408E2EF59AD2251E734E948CB62
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D70E50
                                            • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,00000030), ref: 00D70E85
                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,00000030), ref: 00D70EC4
                                            • _wcslen.LIBCMT ref: 00D70ED4
                                            • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,?,00000030), ref: 00D70F51
                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,00000030), ref: 00D70F93
                                            • _wcslen.LIBCMT ref: 00D70FA3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FullNamePath$_wcslen$H_prolog3_
                                            • String ID:
                                            • API String ID: 840513527-0
                                            • Opcode ID: 1f219cf765dd14516ec0f068182ec8785292363cfb8a1e5cf4663a2115bbafb8
                                            • Instruction ID: 05ce51bca45f1f78fcc93ca9054b1125ab7c3bcc167e2a117a588ac8d8d079bc
                                            • Opcode Fuzzy Hash: 1f219cf765dd14516ec0f068182ec8785292363cfb8a1e5cf4663a2115bbafb8
                                            • Instruction Fuzzy Hash: 09615C75D00208EBDB14DFA8D985EEEBBB9EF89710F18811AF414E7290EB349944CB71
                                            APIs
                                            • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,00D969AE,?,00000000,?,00000000,00000000), ref: 00D9627B
                                            • __fassign.LIBCMT ref: 00D962F6
                                            • __fassign.LIBCMT ref: 00D96311
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 00D96337
                                            • WriteFile.KERNEL32(?,?,00000000,00D969AE,00000000,?,?,?,?,?,?,?,?,?,00D969AE,?), ref: 00D96356
                                            • WriteFile.KERNEL32(?,?,00000001,00D969AE,00000000,?,?,?,?,?,?,?,?,?,00D969AE,?), ref: 00D9638F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                            • String ID:
                                            • API String ID: 1324828854-0
                                            • Opcode ID: 8f9737d8e08a9ae6a6ddd8090d676fbb22a1b2865070f9479b90decbc359ca68
                                            • Instruction ID: 6821eb9ac91c36e3f0e5faeb740a2d435e8b1d665b36fa9e609c3396c1bb440d
                                            • Opcode Fuzzy Hash: 8f9737d8e08a9ae6a6ddd8090d676fbb22a1b2865070f9479b90decbc359ca68
                                            • Instruction Fuzzy Hash: 4A516F71A00249DFDF10CFA8D855AEEBBF8EB49310F18411AE956E7291E771E941CB70
                                            APIs
                                            • _ValidateLocalCookies.LIBCMT ref: 00D893F7
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00D893FF
                                            • _ValidateLocalCookies.LIBCMT ref: 00D89488
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00D894B3
                                            • _ValidateLocalCookies.LIBCMT ref: 00D89508
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 1170836740-1018135373
                                            • Opcode ID: ffac9c0c3331f103c683ba21c0d20d99fb4802fede3d016cd456a363243bd581
                                            • Instruction ID: 4e7eee0520da0025b7d5caa29188167b706ddcbc64e2a4690fff24be3b9b9c2b
                                            • Opcode Fuzzy Hash: ffac9c0c3331f103c683ba21c0d20d99fb4802fede3d016cd456a363243bd581
                                            • Instruction Fuzzy Hash: 38419334A002089FCF10EF6CC894AAEBBB5FF45314F188155E855AB392D771E906CBB1
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D7E26C
                                            • ShowWindow.USER32(?,00000000,00000038), ref: 00D7E294
                                            • GetWindowRect.USER32(?,?), ref: 00D7E2D8
                                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 00D7E373
                                            • ShowWindow.USER32(00000000,00000005), ref: 00D7E394
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Window$Show$H_prolog3_Rect
                                            • String ID: RarHtmlClassName
                                            • API String ID: 950582801-1658105358
                                            • Opcode ID: 494a0bf6f997af51a7ec5a32b0d9690505d8dacb5061963bb7a1606d2b318b1a
                                            • Instruction ID: 8e6d5fe36e328b6dc5eccf08efdf04d451da72674c4f7f1d92cf4a6646dd070b
                                            • Opcode Fuzzy Hash: 494a0bf6f997af51a7ec5a32b0d9690505d8dacb5061963bb7a1606d2b318b1a
                                            • Instruction Fuzzy Hash: 08416D71900204EFDF11AFA8DC89A9E7BB9EF48301F188195F908EB255EB349941CB70
                                            APIs
                                              • Part of subcall function 00D93518: _free.LIBCMT ref: 00D93541
                                            • _free.LIBCMT ref: 00D935A2
                                              • Part of subcall function 00D903D4: RtlFreeHeap.NTDLL(00000000,00000000,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?), ref: 00D903EA
                                              • Part of subcall function 00D903D4: GetLastError.KERNEL32(?,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?,?), ref: 00D903FC
                                            • _free.LIBCMT ref: 00D935AD
                                            • _free.LIBCMT ref: 00D935B8
                                            • _free.LIBCMT ref: 00D9360C
                                            • _free.LIBCMT ref: 00D93617
                                            • _free.LIBCMT ref: 00D93622
                                            • _free.LIBCMT ref: 00D9362D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: ab47a35b4bbe4dfe32203c1e62b6aae3bc761e273b4d797f2b7891905fbb6212
                                            • Instruction ID: b85f1fb7ddbf9a9115e36ca578075d94248d494e7338ea96ca61915f83bb056c
                                            • Opcode Fuzzy Hash: ab47a35b4bbe4dfe32203c1e62b6aae3bc761e273b4d797f2b7891905fbb6212
                                            • Instruction Fuzzy Hash: E411C671940B04BBDF70BBB0DC46FCB7B9CEF08700F414915B299A6192DAB6EA0587B0
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00D84DDA,00D84D3D,00D84FDE), ref: 00D84D76
                                            • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00D84D8C
                                            • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00D84DA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AddressProc$HandleModule
                                            • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                            • API String ID: 667068680-1718035505
                                            • Opcode ID: b1253141c4431b07389c6dce5473c712b46ad8d48a53490a84cef6720af75e12
                                            • Instruction ID: 4318ad16be19c957b9a9321ef129b777199e304a0c1f59b7c531fc9bc29045ac
                                            • Opcode Fuzzy Hash: b1253141c4431b07389c6dce5473c712b46ad8d48a53490a84cef6720af75e12
                                            • Instruction Fuzzy Hash: 34F0F631711B23FB4F62BFB56C8477623DCAA0571571C0639DA41D2380E610CC124BB0
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00D8C5A2,00D8C5A2,?,?,?,00D9185A,00000001,00000001,C5E85006), ref: 00D91663
                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00D9185A,00000001,00000001,C5E85006,?,?,?), ref: 00D916E9
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,C5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00D917E3
                                            • __freea.LIBCMT ref: 00D917F0
                                              • Part of subcall function 00D9040E: RtlAllocateHeap.NTDLL(00000000,00D8535E,?,?,00D86C16,?,?,?,?,?,00D85269,00D8535E,?,?,?,?), ref: 00D90440
                                            • __freea.LIBCMT ref: 00D917F9
                                            • __freea.LIBCMT ref: 00D9181E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                            • String ID:
                                            • API String ID: 1414292761-0
                                            • Opcode ID: 29f2d65f7a0b2e9089c6e6877c9bb1b529a3485152bfaedf84ca97f3f3f34768
                                            • Instruction ID: df507dffee8317901f4327c4b5c76cf088df79f03fe68e4cdd72377c102f5568
                                            • Opcode Fuzzy Hash: 29f2d65f7a0b2e9089c6e6877c9bb1b529a3485152bfaedf84ca97f3f3f34768
                                            • Instruction Fuzzy Hash: 9F51B17A600217AFEF259FA4CC81EBB77AAEB44750F194629FC05D6250EB34DC50D6B0
                                            APIs
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?), ref: 00D77B06
                                              • Part of subcall function 00D7067E: GetVersionExW.KERNEL32(?), ref: 00D706AF
                                            • LocalFileTimeToFileTime.KERNEL32(?,?,?,?), ref: 00D77B2A
                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?), ref: 00D77B44
                                            • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?,?,?), ref: 00D77B57
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 00D77B67
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 00D77B77
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Time$File$System$Local$SpecificVersion
                                            • String ID:
                                            • API String ID: 2092733347-0
                                            • Opcode ID: 89f504aab82006f97c98ac1c606cf10e7262dc5e6f3eba4129f6384fd4e239c7
                                            • Instruction ID: e543aabb8c6f4ee3a2a76d6f2553a67779960d1bcec19cb89c8ffb8763f3b0e2
                                            • Opcode Fuzzy Hash: 89f504aab82006f97c98ac1c606cf10e7262dc5e6f3eba4129f6384fd4e239c7
                                            • Instruction Fuzzy Hash: 984106761183159BC704DFA8C88499BB7E8FF98714F04991EF999C7320E730D949CBAA
                                            APIs
                                            • FileTimeToSystemTime.KERNEL32(?,?,7889FE40,?,?,?,?,00D9AA27,000000FF), ref: 00D7F38A
                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?,?,?,00D9AA27,000000FF), ref: 00D7F399
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,00D9AA27,000000FF), ref: 00D7F3A7
                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,00D9AA27,000000FF), ref: 00D7F3B5
                                            • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032,?,?,?,?,00D9AA27,000000FF), ref: 00D7F3D0
                                            • GetTimeFormatW.KERNEL32(00000400,?,?,00000000,?,00000032,?,?,?,?,00D9AA27,000000FF), ref: 00D7F3FA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Time$System$File$Format$DateLocalSpecific
                                            • String ID:
                                            • API String ID: 909090443-0
                                            • Opcode ID: 0f1a8640287635e22dc3301313347bc1683f9509b19d5d5f9f08c34241bcd6a1
                                            • Instruction ID: 27ec6acd203d7b06eda2c7d09ec9775a9a73c2473f20fc98ef96ab2d5b4f46ee
                                            • Opcode Fuzzy Hash: 0f1a8640287635e22dc3301313347bc1683f9509b19d5d5f9f08c34241bcd6a1
                                            • Instruction Fuzzy Hash: 54311CB2510288AFDB20DFA4DC45EEF77ACFB19704F04412AF906D6241EB74AA08CB70
                                            APIs
                                            • GetLastError.KERNEL32(?,?,00D89771,00D896CC,00D86A64), ref: 00D89788
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D89796
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D897AF
                                            • SetLastError.KERNEL32(00000000,00D89771,00D896CC,00D86A64), ref: 00D89801
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: ae85175b9d340216b1c0c465fb715d02c455afd062e32544f1080d0e8b683413
                                            • Instruction ID: 7f2871c5f31f34c8f5c241ebb745f573a6aad222beebd0c5400bc6c1937427e3
                                            • Opcode Fuzzy Hash: ae85175b9d340216b1c0c465fb715d02c455afd062e32544f1080d0e8b683413
                                            • Instruction Fuzzy Hash: 3501247213D3129EA6243F796CB557AA794EB02371739032AF061952E0EF118C00D3B0
                                            APIs
                                            • GetLastError.KERNEL32(?,?,00D8B581,?,00DAE088,?,00D8AE80,?,00DAE088,?,00000007), ref: 00D90009
                                            • _free.LIBCMT ref: 00D9003C
                                            • _free.LIBCMT ref: 00D90064
                                            • SetLastError.KERNEL32(00000000,00DAE088,?,00000007), ref: 00D90071
                                            • SetLastError.KERNEL32(00000000,00DAE088,?,00000007), ref: 00D9007D
                                            • _abort.LIBCMT ref: 00D90083
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_free$_abort
                                            • String ID:
                                            • API String ID: 3160817290-0
                                            • Opcode ID: 67482fd272156d9b1abbdd5c45fe672ef8a98f1b5f6bd8f4f657679b26001a4e
                                            • Instruction ID: 9c97e3ba7c018b62a03c66afb25ddfb3020f0bc89b14879595f165ad040ab0c5
                                            • Opcode Fuzzy Hash: 67482fd272156d9b1abbdd5c45fe672ef8a98f1b5f6bd8f4f657679b26001a4e
                                            • Instruction Fuzzy Hash: 0FF06836104701AFCF227778BC06F6B2E5ADFC2771F290115F55DD2292EE7988468674
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00D83FDB
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D83FF5
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00D84006
                                            • TranslateMessage.USER32(?), ref: 00D84010
                                            • DispatchMessageW.USER32(?), ref: 00D8401A
                                            • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00D84025
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                            • String ID:
                                            • API String ID: 2148572870-0
                                            • Opcode ID: 3f0424ef0d40db4158fefb427bd16381b4fe3d9a46f14f7a43fb698570bc3619
                                            • Instruction ID: 104dc9c14976c57a30b7cb7c27903b36673e177c1bbc6bd4ede186a3e13e3aa2
                                            • Opcode Fuzzy Hash: 3f0424ef0d40db4158fefb427bd16381b4fe3d9a46f14f7a43fb698570bc3619
                                            • Instruction Fuzzy Hash: 7EF03C72E0122AEBCB206BA1EC4CEDF7E7DEF81791F044112B60AE2150E6349541CBB0
                                            APIs
                                            • GetDlgItem.USER32(?,00000066), ref: 00D826A9
                                            • SendMessageW.USER32(00000000,00000143,00000000,00DB5380), ref: 00D826D6
                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00D82702
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00D825F4
                                            • ProgramFilesDir, xrefs: 00D825E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: MessageSend$Item
                                            • String ID: ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                            • API String ID: 3888421826-2634093826
                                            • Opcode ID: 32b108c7212bf95b4022d646cc7c241fe0b486b61e1564cfbe6d9790b290687d
                                            • Instruction ID: d797bb3ac949b0d2871333e3280ed12d9d51a1093683a14d326933e3c9689291
                                            • Opcode Fuzzy Hash: 32b108c7212bf95b4022d646cc7c241fe0b486b61e1564cfbe6d9790b290687d
                                            • Instruction Fuzzy Hash: D5814A35940258DBDF24EBE4C891BEDB7B8EF18310F080199E546B7281EB705B89CB70
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _wcslen$H_prolog3
                                            • String ID: &nbsp;$<br>
                                            • API String ID: 1035939448-26742755
                                            • Opcode ID: f6c4ff357b05c576be7117f5af0812db5e6bb40effb242c74d52a83e3f75e568
                                            • Instruction ID: f6c84a7e851fcc46355fb85efd78628f5bc9da03abf5e762dd73e9931125b859
                                            • Opcode Fuzzy Hash: f6c4ff357b05c576be7117f5af0812db5e6bb40effb242c74d52a83e3f75e568
                                            • Instruction Fuzzy Hash: 41411830B003119BDB25AF54D981A2D7773FFA5704F64C42AE40A9B281FBB599928BF1
                                            APIs
                                            • LoadBitmapW.USER32(00000065), ref: 00D807F5
                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 00D8081A
                                            • DeleteObject.GDI32(00000000), ref: 00D8084C
                                            • DeleteObject.GDI32(00000000), ref: 00D8086F
                                              • Part of subcall function 00D7EBD3: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00D80845,00000066), ref: 00D7EBE6
                                              • Part of subcall function 00D7EBD3: SizeofResource.KERNEL32(00000000,?,?,?,00D80845,00000066), ref: 00D7EBFD
                                              • Part of subcall function 00D7EBD3: LoadResource.KERNEL32(00000000,?,?,?,00D80845,00000066), ref: 00D7EC14
                                              • Part of subcall function 00D7EBD3: LockResource.KERNEL32(00000000,?,?,?,00D80845,00000066), ref: 00D7EC23
                                              • Part of subcall function 00D7EBD3: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00D80845,00000066), ref: 00D7EC3E
                                              • Part of subcall function 00D7EBD3: GlobalLock.KERNEL32(00000000), ref: 00D7EC4F
                                              • Part of subcall function 00D7EBD3: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00D7EC73
                                              • Part of subcall function 00D7EBD3: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00D7ECB8
                                              • Part of subcall function 00D7EBD3: GlobalUnlock.KERNEL32(00000000), ref: 00D7ECD7
                                              • Part of subcall function 00D7EBD3: GlobalFree.KERNEL32(00000000), ref: 00D7ECDE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                            • String ID: ]
                                            • API String ID: 1797374341-3352871620
                                            • Opcode ID: ff42c1431ef3e38f7b22764451dd2282c0f25573464e5480ecd5e9d29c73d72d
                                            • Instruction ID: 06b1a0b2e810d1db3ec4389ada4a9b91da1852bf5f016a78f9948d770aa7d81f
                                            • Opcode Fuzzy Hash: ff42c1431ef3e38f7b22764451dd2282c0f25573464e5480ecd5e9d29c73d72d
                                            • Instruction Fuzzy Hash: 1401CC32940205E7EB1277A49C0AA6F7B7AEFC4B51F090165F904A73D1EB71CC0996F0
                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00D8ECE0,00000000,?,00D8EC80,00000000,00DA6F40,0000000C,00D8EDD7,00000000,00000002), ref: 00D8ED4F
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D8ED62
                                            • FreeLibrary.KERNEL32(00000000,?,?,?,00D8ECE0,00000000,?,00D8EC80,00000000,00DA6F40,0000000C,00D8EDD7,00000000,00000002), ref: 00D8ED85
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 0fea3be5b5b2ac939aebf1778e4ce78ba05b16be17267470fcbd4127bd77c40e
                                            • Instruction ID: 3d840ce8aad03646203c07743d3d043562a6a24700422e85561bb99f48a459e6
                                            • Opcode Fuzzy Hash: 0fea3be5b5b2ac939aebf1778e4ce78ba05b16be17267470fcbd4127bd77c40e
                                            • Instruction Fuzzy Hash: 9EF03C34A10218FBCB11AFA5DC49BAEBFB5EB08725F444169B809E6250CB704945CBB0
                                            APIs
                                              • Part of subcall function 00D76C5E: __EH_prolog3_GS.LIBCMT ref: 00D76C65
                                              • Part of subcall function 00D76C5E: GetSystemDirectoryW.KERNEL32(00000000,00000104), ref: 00D76C9A
                                            • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00D750B3
                                            • GetProcAddress.KERNEL32(00DB51F8,CryptUnprotectMemory), ref: 00D750C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AddressProc$DirectoryH_prolog3_System
                                            • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                            • API String ID: 270589589-1753850145
                                            • Opcode ID: 4c52af9bb196331ed555f0b0877a33981bdb4d9f7f4768696eaf88dace8db17d
                                            • Instruction ID: b8990d43c4fc75e61c23ee128ac29cacb4696d2f5c3bba0d36f7e7a5265b4133
                                            • Opcode Fuzzy Hash: 4c52af9bb196331ed555f0b0877a33981bdb4d9f7f4768696eaf88dace8db17d
                                            • Instruction Fuzzy Hash: 3AE04F70820B11DECB315B74EC097467ED4AF04714F14D82EA4DDD3641E6B4E4448BB0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AdjustPointer$_abort
                                            • String ID:
                                            • API String ID: 2252061734-0
                                            • Opcode ID: fd53fb139309a47934273caa25412b3e6072fe79c592f7ff9fcb46afc77519bc
                                            • Instruction ID: 897a9191640876ec6159210eefc40da390678cafcd7642a5f4a391a241740ffc
                                            • Opcode Fuzzy Hash: fd53fb139309a47934273caa25412b3e6072fe79c592f7ff9fcb46afc77519bc
                                            • Instruction Fuzzy Hash: FA51B172A01206AFDB29BF54D861BBAF7A4EF40710F1C452DE88597291E731ED85CBB0
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6F3C5
                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,00000050,00D6B749,?,?,?,?,?,?), ref: 00D6F450
                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?), ref: 00D6F4A7
                                            • SetFileTime.KERNEL32(?,?,?,?), ref: 00D6F569
                                            • CloseHandle.KERNEL32(?), ref: 00D6F570
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: File$Create$CloseH_prolog3_HandleTime
                                            • String ID:
                                            • API String ID: 4002707884-0
                                            • Opcode ID: dfd39d346a8ece57624952d541ec5eb5f4726e07b51316ad8fc134c6822cf3a4
                                            • Instruction ID: 5434d9c29dbea439c5676838a362da03899e5ae9648e29866e476c094cb064d3
                                            • Opcode Fuzzy Hash: dfd39d346a8ece57624952d541ec5eb5f4726e07b51316ad8fc134c6822cf3a4
                                            • Instruction Fuzzy Hash: 7A519F71900648ABDF14DFE8E885BEEBBB5AF48310F284529F551F7280DB34AA45CB34
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 00D92BE9
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D92C0C
                                              • Part of subcall function 00D9040E: RtlAllocateHeap.NTDLL(00000000,00D8535E,?,?,00D86C16,?,?,?,?,?,00D85269,00D8535E,?,?,?,?), ref: 00D90440
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00D92C32
                                            • _free.LIBCMT ref: 00D92C45
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D92C54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                            • String ID:
                                            • API String ID: 336800556-0
                                            • Opcode ID: 2fc94aa1501e8242e2b6cc40e0951428ba4bd1faa523e3f36a49c41b77955000
                                            • Instruction ID: c1a1582b356cc528a18434e5a780b7537b9a1dc676c4285e4e7595a457928966
                                            • Opcode Fuzzy Hash: 2fc94aa1501e8242e2b6cc40e0951428ba4bd1faa523e3f36a49c41b77955000
                                            • Instruction Fuzzy Hash: 1001A2726017157F3B252AB66C8CC7F7E6DDEC6BA1319012AF944E6211DA60CC0192B4
                                            APIs
                                            • GetLastError.KERNEL32(00D8535E,00D8535E,?,00D901D8,00D90451,?,?,00D86C16,?,?,?,?,?,00D85269,00D8535E,?), ref: 00D9008E
                                            • _free.LIBCMT ref: 00D900C3
                                            • _free.LIBCMT ref: 00D900EA
                                            • SetLastError.KERNEL32(00000000,?,00D8535E), ref: 00D900F7
                                            • SetLastError.KERNEL32(00000000,?,00D8535E), ref: 00D90100
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_free
                                            • String ID:
                                            • API String ID: 3170660625-0
                                            • Opcode ID: 9105fab82e7f5bc371ef56b5fa74926b99500263075d0525b06893b54cdd4556
                                            • Instruction ID: 781af7aebfbe358bbf81c6740f3c229ccfa78478526611afeadec5b6e959fe5e
                                            • Opcode Fuzzy Hash: 9105fab82e7f5bc371ef56b5fa74926b99500263075d0525b06893b54cdd4556
                                            • Instruction Fuzzy Hash: BA01F436245701AF8F227774BD86A2B2D6ADFC2771B2A0125F54DE2292EE74C8059270
                                            APIs
                                            • _free.LIBCMT ref: 00D934C7
                                              • Part of subcall function 00D903D4: RtlFreeHeap.NTDLL(00000000,00000000,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?), ref: 00D903EA
                                              • Part of subcall function 00D903D4: GetLastError.KERNEL32(?,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?,?), ref: 00D903FC
                                            • _free.LIBCMT ref: 00D934D9
                                            • _free.LIBCMT ref: 00D934EB
                                            • _free.LIBCMT ref: 00D934FD
                                            • _free.LIBCMT ref: 00D9350F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: d0f7ed4b3cff8aa241797812aa86dfb864bc59892e34c6857fa91dc5cf4acdc3
                                            • Instruction ID: 870920f5ccbb3c8606ce0c0b9ff83ae39345b6f90a91bf10b4f274d5d7309764
                                            • Opcode Fuzzy Hash: d0f7ed4b3cff8aa241797812aa86dfb864bc59892e34c6857fa91dc5cf4acdc3
                                            • Instruction Fuzzy Hash: F2F01272505200AB8F60EBA8F886C56B7D9EF4571075E4905F418E7A01CB71FE80C7B0
                                            APIs
                                            • _free.LIBCMT ref: 00D8F7DE
                                              • Part of subcall function 00D903D4: RtlFreeHeap.NTDLL(00000000,00000000,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?), ref: 00D903EA
                                              • Part of subcall function 00D903D4: GetLastError.KERNEL32(?,?,00D93546,?,00000000,?,00000000,?,00D9356D,?,00000007,?,?,00D9396A,?,?), ref: 00D903FC
                                            • _free.LIBCMT ref: 00D8F7F0
                                            • _free.LIBCMT ref: 00D8F803
                                            • _free.LIBCMT ref: 00D8F814
                                            • _free.LIBCMT ref: 00D8F825
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: f70738aacbda275d06e591488e3a4dc05ac33e8d2a9ec42f4a33752eebf35778
                                            • Instruction ID: 4674844f5f639d34f86ed31bfda951d12ae64a6627605acbd5798697fe59356a
                                            • Opcode Fuzzy Hash: f70738aacbda275d06e591488e3a4dc05ac33e8d2a9ec42f4a33752eebf35778
                                            • Instruction Fuzzy Hash: 5EF0FE71811320EF9B11AF24BC524087BE1FB15B25319031AF419E67B6CB7A9942CBF1
                                            APIs
                                            • _wcslen.LIBCMT ref: 00D831A4
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _wcslen
                                            • String ID: .lnk$0$lnk
                                            • API String ID: 176396367-906397761
                                            • Opcode ID: e7c92b828e562dbf9e50e7db63ec19f04e76e95244c933c70fe2ed8bbafc1f18
                                            • Instruction ID: 5098e09c7cbfbe1bac5188689e9a8dc96150fc748743115ee3d9ca8a04df6fb5
                                            • Opcode Fuzzy Hash: e7c92b828e562dbf9e50e7db63ec19f04e76e95244c933c70fe2ed8bbafc1f18
                                            • Instruction Fuzzy Hash: 5FE10671D002589FDB24EBA4CC85BDDB7B8EF08300F5445AAE549A7291EB749B88CF70
                                            APIs
                                            • GetTempPathW.KERNEL32(00000105,00000000,00000000,0000020A), ref: 00D82B66
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                              • Part of subcall function 00D70BF3: _wcslen.LIBCMT ref: 00D70C03
                                            • EndDialog.USER32(?,00000001), ref: 00D82EDA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _wcslen$DialogPathTemp
                                            • String ID: $@set:user
                                            • API String ID: 2172748170-1503366402
                                            • Opcode ID: 40595942727304992b49787ec7e029890405d4e45cc00d10e0cdd2d754bfc5ff
                                            • Instruction ID: 14c6d0726bc6d6cfda44b80761d7b4d68526b63bb6eb6124716f4aa381c5899a
                                            • Opcode Fuzzy Hash: 40595942727304992b49787ec7e029890405d4e45cc00d10e0cdd2d754bfc5ff
                                            • Instruction Fuzzy Hash: 32C12674801299DBDF21EBA4DC45BEDBBB8AF15300F08419AE449B3292DB705B89CF71
                                            APIs
                                              • Part of subcall function 00D71309: __EH_prolog3.LIBCMT ref: 00D71310
                                              • Part of subcall function 00D71309: GetCurrentDirectoryW.KERNEL32(00000000,00000000,0000000C,00D717FB,?,?,\\?\,7889FE40,?,?,?,00000000,00D9A279,000000FF), ref: 00D71319
                                              • Part of subcall function 00D71AD1: __EH_prolog3_GS.LIBCMT ref: 00D71AD8
                                              • Part of subcall function 00D6F763: __EH_prolog3_GS.LIBCMT ref: 00D6F76A
                                              • Part of subcall function 00D6F58B: __EH_prolog3_GS.LIBCMT ref: 00D6F592
                                              • Part of subcall function 00D6F58B: SetFileAttributesW.KERNELBASE(?,?,00000024,00D6A724,?,?,?,00000011,?,?,00000000,?,?,?,?,?), ref: 00D6F5A8
                                              • Part of subcall function 00D6F58B: SetFileAttributesW.KERNEL32(?,?,?,?,?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049), ref: 00D6F5EB
                                            • SHFileOperationW.SHELL32(?,00000000,?,?,?,00000000), ref: 00D82137
                                            • MoveFileW.KERNEL32(?,?), ref: 00D822BE
                                            • MoveFileExW.KERNEL32(?,00000000,00000004), ref: 00D822D8
                                              • Part of subcall function 00D714CC: __EH_prolog3_GS.LIBCMT ref: 00D714D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: File$H_prolog3_$AttributesMove$CurrentDirectoryH_prolog3Operation
                                            • String ID: .tmp
                                            • API String ID: 1688541384-2986845003
                                            • Opcode ID: 10955cb5718e418d7f5a5e2cd0b97becaccc81fd880549ab7efe72be3952732a
                                            • Instruction ID: 64af873ce70bb8f76d3f83aacb69ee91432305a3bba5634a02bd4cf83f4161b7
                                            • Opcode Fuzzy Hash: 10955cb5718e418d7f5a5e2cd0b97becaccc81fd880549ab7efe72be3952732a
                                            • Instruction Fuzzy Hash: BCC1C0758002689ADB61EFA4CC85BDDB7B8BF08304F5441EAE449A3251DB345B89CF71
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D6A307
                                            • GetLastError.KERNEL32(00000054,?,?,?,?,?,00D6D303,?,?,?,?,?,?,?,7889FE40,00000049), ref: 00D6A427
                                              • Part of subcall function 00D6AC11: GetCurrentProcess.KERNEL32(00000020,?), ref: 00D6AC2E
                                              • Part of subcall function 00D6AC11: GetLastError.KERNEL32 ref: 00D6AC72
                                              • Part of subcall function 00D6AC11: CloseHandle.KERNEL32(?), ref: 00D6AC81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CloseCurrentH_prolog3_HandleProcess
                                            • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                            • API String ID: 2235100918-639343689
                                            • Opcode ID: df1b8fad912452f89c76a61116f52b6fa0131ad67255d6f7009535fac694f008
                                            • Instruction ID: 81cae95556bbaebc431b22bdea5d02aed48b2fdcfad3006d76c8717a7dae4345
                                            • Opcode Fuzzy Hash: df1b8fad912452f89c76a61116f52b6fa0131ad67255d6f7009535fac694f008
                                            • Instruction Fuzzy Hash: 63411A71E10208AFDF14EBACE985AEDB7B8EB49314F04402AF545B7341DBB5A944CB36
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1wYGO0mAN2.exe,00000104), ref: 00D8EE6A
                                            • _free.LIBCMT ref: 00D8EF35
                                            • _free.LIBCMT ref: 00D8EF3F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: _free$FileModuleName
                                            • String ID: C:\Users\user\Desktop\1wYGO0mAN2.exe
                                            • API String ID: 2506810119-3236848191
                                            • Opcode ID: ba88b395856f9ae8ceb2de68bbb179d0b68d51f6902ab81474ca3f4cc17bef75
                                            • Instruction ID: eb15d0f5955ba10cca4f7560ae60a94066f08e6d3f4dd7388690ed8adc16ef56
                                            • Opcode Fuzzy Hash: ba88b395856f9ae8ceb2de68bbb179d0b68d51f6902ab81474ca3f4cc17bef75
                                            • Instruction Fuzzy Hash: 41316B71A04358EFCB22AB999C8199EBBFCEF85714F1441A6F904E7211D7709A40DFB0
                                            APIs
                                            • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00D89E7B
                                            • _abort.LIBCMT ref: 00D89F86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: EncodePointer_abort
                                            • String ID: MOC$RCC
                                            • API String ID: 948111806-2084237596
                                            • Opcode ID: 0f4cc5edb3595b304d8ada5c17edae69b683b25799810baaf57fc33ac89024ab
                                            • Instruction ID: fab92c4ea7663ffc4b1f841e3d0644737a7de182d63a8b5fe5ce822e86038799
                                            • Opcode Fuzzy Hash: 0f4cc5edb3595b304d8ada5c17edae69b683b25799810baaf57fc33ac89024ab
                                            • Instruction Fuzzy Hash: 14418B71900209AFCF1AEF98CD91AEEBBB5FF48304F1C4199FA44A7221D3359A51DB60
                                            APIs
                                            • __fprintf_l.LIBCMT ref: 00D7340E
                                            • _strncpy.LIBCMT ref: 00D73459
                                              • Part of subcall function 00D789ED: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000050,?,00000000,00000000,00DAE088,?,00000007,00D733E2,?,?,00000050,7889FE40), ref: 00D78A0A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                            • String ID: $%s$@%s
                                            • API String ID: 562999700-834177443
                                            • Opcode ID: c288ee11e6cdcbaceb9a3ac19bf6d56b1d569a01cdf317c2e6069deda86e22c1
                                            • Instruction ID: 1b74e930ed3d78591fb0d56f9e7c6b23c0dbe574ad9c52cd0341fca7ed1be09a
                                            • Opcode Fuzzy Hash: c288ee11e6cdcbaceb9a3ac19bf6d56b1d569a01cdf317c2e6069deda86e22c1
                                            • Instruction Fuzzy Hash: 7221A07250070DAFDB15DEA8CC45EAE7BA8FB04300F088525FA18D7281E731EA15DB70
                                            APIs
                                            • __EH_prolog3_GS.LIBCMT ref: 00D7F8F7
                                              • Part of subcall function 00D61E44: GetDlgItem.USER32(00000000,00003021), ref: 00D61E88
                                              • Part of subcall function 00D61E44: SetWindowTextW.USER32(00000000,00D9C6C8), ref: 00D61E9E
                                            • EndDialog.USER32(?,00000001), ref: 00D7F99F
                                            • SetDlgItemTextW.USER32(?,00000066,00000000), ref: 00D7F9E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ItemText$DialogH_prolog3_Window
                                            • String ID: ASKNEXTVOL
                                            • API String ID: 2321058237-3402441367
                                            • Opcode ID: eff524976f5e3ff58f464bf795af16435f26dc0de7ca132710ed1d0d1f2da272
                                            • Instruction ID: 8f99701a4c25fcb3d8ff0aec8564fb27d76b2f12f1c525dcd950a6e19dcb15eb
                                            • Opcode Fuzzy Hash: eff524976f5e3ff58f464bf795af16435f26dc0de7ca132710ed1d0d1f2da272
                                            • Instruction Fuzzy Hash: FA210A36650204EFDB24EFA8DC46FAD37A8EB46300F148025F6459B2A5D731DA05CF76
                                            APIs
                                            • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00D6FEBD,00000008,00000004,00D72D42,?,?,?,?,00000000,00D7ABB6,?), ref: 00D77484
                                            • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00D6FEBD,00000008,00000004,00D72D42,?,?,?,?,00000000), ref: 00D7748E
                                            • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00D6FEBD,00000008,00000004,00D72D42,?,?,?,?,00000000), ref: 00D7749E
                                            Strings
                                            • Thread pool initialization failed., xrefs: 00D774B6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Create$CriticalEventInitializeSectionSemaphore
                                            • String ID: Thread pool initialization failed.
                                            • API String ID: 3340455307-2182114853
                                            • Opcode ID: b009d4f6b23f562787e925906244eef6e61788b433535537f76c591f6df5e402
                                            • Instruction ID: 5524239e8608aa4907644319bcb2073dc1863bfda763eadff513c1f7ade7a2c9
                                            • Opcode Fuzzy Hash: b009d4f6b23f562787e925906244eef6e61788b433535537f76c591f6df5e402
                                            • Instruction Fuzzy Hash: 8B1191B1604709AFC3215F669C849A7FBECFB59748F144C2EF1DEC2200E6B059808B74
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RENAMEDLG$REPLACEFILEDLG
                                            • API String ID: 0-56093855
                                            • Opcode ID: 2914fe7d68313059178202cb1f625be1c27c5aa08b5d94e6029112aa6c481d0f
                                            • Instruction ID: 924c451d071d7d747d44e72cb538dd3d74d1c77ac90ec7b4992af00d06c0900c
                                            • Opcode Fuzzy Hash: 2914fe7d68313059178202cb1f625be1c27c5aa08b5d94e6029112aa6c481d0f
                                            • Instruction Fuzzy Hash: 49113C35304302EFD711EF29FC48A277BE9E749792B08452AFA86C3324D6719844DB71
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00D8A843,00000000,?,00DB6150,?,?,?,00D8A9E6,00000004,InitializeCriticalSectionEx,00D9F7F4,InitializeCriticalSectionEx), ref: 00D8A89F
                                            • GetLastError.KERNEL32(?,00D8A843,00000000,?,00DB6150,?,?,?,00D8A9E6,00000004,InitializeCriticalSectionEx,00D9F7F4,InitializeCriticalSectionEx,00000000,?,00D8A79D), ref: 00D8A8A9
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00D8A8D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID: api-ms-
                                            • API String ID: 3177248105-2084034818
                                            • Opcode ID: bf5fd7ecc6bb1bcb90dd2996f7a7d7daad6e30fffe86e0593da4484e24f2ffe5
                                            • Instruction ID: 7fe5e9db7dcf64353020af6e0ca9dc091dab01e30d88abb2c548e76eaeb56dd4
                                            • Opcode Fuzzy Hash: bf5fd7ecc6bb1bcb90dd2996f7a7d7daad6e30fffe86e0593da4484e24f2ffe5
                                            • Instruction Fuzzy Hash: 4BE04F30280305BBEF202BA0EC06B183BA9AB10B91F140032F90DE85E0D7619851ABBA
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: __alldvrm$_strrchr
                                            • String ID:
                                            • API String ID: 1036877536-0
                                            • Opcode ID: 1ec6666d94b4212580304211626675eb5ed9854efa503107affec4ce99a0ac8c
                                            • Instruction ID: 80deccb02e0bb37fc17f2c591ecddc1d878e6f53edb5d10a086d4039d3f3d0c8
                                            • Opcode Fuzzy Hash: 1ec6666d94b4212580304211626675eb5ed9854efa503107affec4ce99a0ac8c
                                            • Instruction Fuzzy Hash: 84A14772A04386AFEF11DF28D8917AEBFE5EF55310F1C41A9E5959B282C6348D41CBB0
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00D90481,?,00000000,?,00000001,?,?,00000001,00D90481,?), ref: 00D93685
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D9370E
                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00D8DBD1,?), ref: 00D93720
                                            • __freea.LIBCMT ref: 00D93729
                                              • Part of subcall function 00D9040E: RtlAllocateHeap.NTDLL(00000000,00D8535E,?,?,00D86C16,?,?,?,?,?,00D85269,00D8535E,?,?,?,?), ref: 00D90440
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                            • String ID:
                                            • API String ID: 2652629310-0
                                            • Opcode ID: d28eb17b82c7e69dbbe93cbd2b14fa00b1885b8965f8350d5bd9fc6820976c48
                                            • Instruction ID: 778060a9479e91e86957c0b9daf91a56229fb5f60d257beb229f228f97aaaec4
                                            • Opcode Fuzzy Hash: d28eb17b82c7e69dbbe93cbd2b14fa00b1885b8965f8350d5bd9fc6820976c48
                                            • Instruction Fuzzy Hash: 1F31A1B2A1020AABDF259F64DC85DAE7BA5EF44750F184169FC04D7250EB35CE51CBB0
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00D762D4
                                            • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000010), ref: 00D762EB
                                            • ExpandEnvironmentStringsW.KERNEL32(?,?,?,00000000,?,?,?,?,?,00000010), ref: 00D76328
                                            • _wcslen.LIBCMT ref: 00D76338
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStrings$H_prolog3_wcslen
                                            • String ID:
                                            • API String ID: 3741103063-0
                                            • Opcode ID: 68bffdc2ffe72dc3e06804b4e4c83881437294383b7cc4153336d038b0c4e456
                                            • Instruction ID: 610994c50fbb3726d05fba658a13d70d2939b10ed500a9f310b1cd68ad8f0df0
                                            • Opcode Fuzzy Hash: 68bffdc2ffe72dc3e06804b4e4c83881437294383b7cc4153336d038b0c4e456
                                            • Instruction Fuzzy Hash: A7119E70A0160AAF9B00AFA89D859BFBB79FF45310B18811DA419E7241FB34ED10CBB4
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00D71273
                                              • Part of subcall function 00D7067E: GetVersionExW.KERNEL32(?), ref: 00D706AF
                                            • FoldStringW.KERNEL32(00000020,?,000000FF,00000000,00000000,0000000C,00D6350C,7889FE68,00000000,?,?,00D643F5,?,?,?,00000000), ref: 00D7129A
                                            • FoldStringW.KERNEL32(00000020,?,000000FF,?,?,00000000), ref: 00D712D4
                                            • _wcslen.LIBCMT ref: 00D712DF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FoldString$H_prolog3Version_wcslen
                                            • String ID:
                                            • API String ID: 535866816-0
                                            • Opcode ID: 33ea98e7540427272e3ff709c0ac8d252cc86f1c5c02a183b6907c152958b4c2
                                            • Instruction ID: 0de1de4a1e6a2aaf5c8c2a281228570c30ea578e2548169999bbf45e03ed031a
                                            • Opcode Fuzzy Hash: 33ea98e7540427272e3ff709c0ac8d252cc86f1c5c02a183b6907c152958b4c2
                                            • Instruction Fuzzy Hash: 63119175A11226ABDB009BAD8D4A96F7BA9EF05720F144309B814E72C1EB70994087F5
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00D9198B,00000000,00000000,00000000,00000000,?,00D91B88,00000006,FlsSetValue), ref: 00D91A16
                                            • GetLastError.KERNEL32(?,00D9198B,00000000,00000000,00000000,00000000,?,00D91B88,00000006,FlsSetValue,00DA0DD0,FlsSetValue,00000000,00000364,?,00D900D7), ref: 00D91A22
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00D9198B,00000000,00000000,00000000,00000000,?,00D91B88,00000006,FlsSetValue,00DA0DD0,FlsSetValue,00000000), ref: 00D91A30
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID:
                                            • API String ID: 3177248105-0
                                            • Opcode ID: 21797363955fe94c5ffb2aa7165786499a350fa7db30c0835b0288565ce8f6ad
                                            • Instruction ID: 392b21dad2688d424bf79bdaf0d19682d39e9f39cffb4046d78c92d48a57274e
                                            • Opcode Fuzzy Hash: 21797363955fe94c5ffb2aa7165786499a350fa7db30c0835b0288565ce8f6ad
                                            • Instruction Fuzzy Hash: 7501F73A6563339BCB218BB99C44A567B98AF057A1B150620F90AD3380C730DC02C6F4
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00D71310
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000,0000000C,00D717FB,?,?,\\?\,7889FE40,?,?,?,00000000,00D9A279,000000FF), ref: 00D71319
                                            • GetCurrentDirectoryW.KERNEL32(?,?,00000000,?,?,?,00000000,00D9A279,000000FF), ref: 00D71348
                                            • _wcslen.LIBCMT ref: 00D71351
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$H_prolog3_wcslen
                                            • String ID:
                                            • API String ID: 19219720-0
                                            • Opcode ID: b1c4ba04549079336de6957965c5c125f0e6513d8541d94591e53f5005ae6d5b
                                            • Instruction ID: b57f1409f4a1bc92bf7ced11eceb419fb2831e6e74241672044188baed3a0581
                                            • Opcode Fuzzy Hash: b1c4ba04549079336de6957965c5c125f0e6513d8541d94591e53f5005ae6d5b
                                            • Instruction Fuzzy Hash: 3501A276900216AB8B10AFFC9D558BFBB79EF85720B14430AB515E7245DF34890087F0
                                            APIs
                                            • SleepConditionVariableCS.KERNELBASE(?,00D862BB,00000064), ref: 00D86341
                                            • LeaveCriticalSection.KERNEL32(00DB60E0,?,?,00D862BB,00000064,?,?,?,?,00000000,00D9A75D,000000FF), ref: 00D8634B
                                            • WaitForSingleObjectEx.KERNEL32(00000064,00000000,?,00D862BB,00000064,?,?,?,?,00000000,00D9A75D,000000FF), ref: 00D8635C
                                            • EnterCriticalSection.KERNEL32(00DB60E0,?,00D862BB,00000064,?,?,?,?,00000000,00D9A75D,000000FF), ref: 00D86363
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                            • String ID:
                                            • API String ID: 3269011525-0
                                            • Opcode ID: 651db59c28850e1e9d34a302843967cf52644ffdc6cb298b96719fa5d3e28d65
                                            • Instruction ID: 2d51684b57ed461af152533d8cf18445deb1093913908c861ded15d9feef3b77
                                            • Opcode Fuzzy Hash: 651db59c28850e1e9d34a302843967cf52644ffdc6cb298b96719fa5d3e28d65
                                            • Instruction Fuzzy Hash: 23E01231951334EFC7113B96EC09BDD7F28EB04BA1F484126F90AE6360C665D9109BF8
                                            APIs
                                            • GetDC.USER32(00000000), ref: 00D7EB77
                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00D7EB86
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D7EB94
                                            • ReleaseDC.USER32(00000000,00000000), ref: 00D7EBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: CapsDevice$Release
                                            • String ID:
                                            • API String ID: 1035833867-0
                                            • Opcode ID: c3e7e21d32f93dafeddaff10d85ba2b3ef5286083b485ba8f6622c6ed6865d7f
                                            • Instruction ID: 46723d094a7b0722b3907db7fa735ce5dd104b24b7cfaf07dbbbd294d29b1ff6
                                            • Opcode Fuzzy Hash: c3e7e21d32f93dafeddaff10d85ba2b3ef5286083b485ba8f6622c6ed6865d7f
                                            • Instruction Fuzzy Hash: DFE0EC3194AF20EBD6612B74BD0DB863EA4EB59B93F000345F605EA394D6A144008BB0
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 00D78294
                                              • Part of subcall function 00D614A7: _wcslen.LIBCMT ref: 00D614B8
                                              • Part of subcall function 00D8087E: __EH_prolog3_GS.LIBCMT ref: 00D80885
                                              • Part of subcall function 00D8087E: GetLastError.KERNEL32(0000001C,00D78244,?,00000000,00000086,?,7889FE40,?,?,?,?,?,00000000,00D9A75D,000000FF), ref: 00D8089D
                                              • Part of subcall function 00D8087E: SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,00D9A75D,000000FF), ref: 00D808D6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorLast$H_prolog3_Init_thread_footer_wcslen
                                            • String ID: %ls
                                            • API String ID: 1279724102-3246610740
                                            • Opcode ID: 470cf2780ff6d8582c5680d1e421b3973cd15860e1e20d674a1a4896332c1597
                                            • Instruction ID: 6837b2be7c5eff73bc7876d32c4e15c468866311b90db4836d27ba8c29d741ea
                                            • Opcode Fuzzy Hash: 470cf2780ff6d8582c5680d1e421b3973cd15860e1e20d674a1a4896332c1597
                                            • Instruction Fuzzy Hash: 67B19174944209EFDB30EF90C94AFAD7BB1EF15305F108419F48A671D5EB71AA18EAB0
                                            APIs
                                              • Part of subcall function 00D7EBAA: GetDC.USER32(00000000), ref: 00D7EBAE
                                              • Part of subcall function 00D7EBAA: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00D7EBB9
                                              • Part of subcall function 00D7EBAA: ReleaseDC.USER32(00000000,00000000), ref: 00D7EBC4
                                            • GetObjectW.GDI32(?,00000018,?), ref: 00D7EF65
                                              • Part of subcall function 00D7F1EC: GetDC.USER32(00000000), ref: 00D7F1F5
                                              • Part of subcall function 00D7F1EC: GetObjectW.GDI32(?,00000018,?), ref: 00D7F224
                                              • Part of subcall function 00D7F1EC: ReleaseDC.USER32(00000000,?), ref: 00D7F2BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ObjectRelease$CapsDevice
                                            • String ID: (
                                            • API String ID: 1061551593-3887548279
                                            • Opcode ID: 377cd9bfdc57fd24e76c517fa3f08e748f26388451e9a85df8e57799c289da8c
                                            • Instruction ID: 0be14cd42da416f2caab7e7bf9b98bf95454ad3f944cc72f319d038e126b99e1
                                            • Opcode Fuzzy Hash: 377cd9bfdc57fd24e76c517fa3f08e748f26388451e9a85df8e57799c289da8c
                                            • Instruction Fuzzy Hash: A091D071618314DFC660DF69C844A2BBBE9FFC9B10F40495EF98AD7260DB70A905CB62
                                            APIs
                                            • _free.LIBCMT ref: 00D91FD4
                                              • Part of subcall function 00D8ACBB: IsProcessorFeaturePresent.KERNEL32(00000017,00D8AC8D,00D8535E,?,?,00000000,00D8535E,00000016,?,?,00D8AC9A,00000000,00000000,00000000,00000000,00000000), ref: 00D8ACBD
                                              • Part of subcall function 00D8ACBB: GetCurrentProcess.KERNEL32(C0000417,?,00D8535E), ref: 00D8ACDF
                                              • Part of subcall function 00D8ACBB: TerminateProcess.KERNEL32(00000000,?,00D8535E), ref: 00D8ACE6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                            • String ID: *?$.
                                            • API String ID: 2667617558-3972193922
                                            • Opcode ID: ddd9ab5e61b6f17a30a233bd59a6b62b4ed979bfdbd97246aefffea125efcfc1
                                            • Instruction ID: d9dfe3c22fcbc2a9b1c1e869cf7b6c293495922f520d6ac96dd81c832d7f5a75
                                            • Opcode Fuzzy Hash: ddd9ab5e61b6f17a30a233bd59a6b62b4ed979bfdbd97246aefffea125efcfc1
                                            • Instruction Fuzzy Hash: 6451757AE0011AAFDF14DFA8C881AADB7B5FF58314F284169E854E7341E7759E018B60
                                            APIs
                                              • Part of subcall function 00D779F7: GetSystemTime.KERNEL32(?,00000000), ref: 00D77A0F
                                              • Part of subcall function 00D779F7: SystemTimeToFileTime.KERNEL32(?,?), ref: 00D77A1D
                                              • Part of subcall function 00D779A0: __aulldiv.LIBCMT ref: 00D779A9
                                            • __aulldiv.LIBCMT ref: 00D6F162
                                            • GetCurrentProcessId.KERNEL32(00000000,?,000186A0,00000000,7889FE40,?,?,00000000,?,00000000,00D99F3D,000000FF), ref: 00D6F169
                                              • Part of subcall function 00D61150: _wcslen.LIBCMT ref: 00D6115B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: Time$System__aulldiv$CurrentFileProcess_wcslen
                                            • String ID: .rartemp
                                            • API String ID: 3789791499-2558811017
                                            • Opcode ID: 016f265239abcffce3521f3f7184edb40c6213443d3e7ff36a84c8284750bf18
                                            • Instruction ID: f36b53eb7dee979f4ee11ae531c25dbca8adc65c64919f9d695d143c4a165a77
                                            • Opcode Fuzzy Hash: 016f265239abcffce3521f3f7184edb40c6213443d3e7ff36a84c8284750bf18
                                            • Instruction Fuzzy Hash: 29418175900248AFDF14EFA4CC46EEEB7A8EF54314F444129F91993281EB749B09CBB0
                                            APIs
                                            • __EH_prolog3.LIBCMT ref: 00D7DAD5
                                              • Part of subcall function 00D70360: __EH_prolog3.LIBCMT ref: 00D70367
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: H_prolog3
                                            • String ID: Shell.Explorer$about:blank
                                            • API String ID: 431132790-874089819
                                            • Opcode ID: 040b6cb80b88c85fad5014b5793dff02a2aa33f161148aebac2787fa547bffb9
                                            • Instruction ID: 25f49c9b9d7a4fdf9055957ce80f42cd5f13094acfcc4966542b41a6a18a3207
                                            • Opcode Fuzzy Hash: 040b6cb80b88c85fad5014b5793dff02a2aa33f161148aebac2787fa547bffb9
                                            • Instruction Fuzzy Hash: CA411D746002059FDB18DF64C855B6A77B6EF88700F15C0ADE94AAF295EB71AD00CB70
                                            APIs
                                              • Part of subcall function 00D61E44: GetDlgItem.USER32(00000000,00003021), ref: 00D61E88
                                              • Part of subcall function 00D61E44: SetWindowTextW.USER32(00000000,00D9C6C8), ref: 00D61E9E
                                            • EndDialog.USER32(?,00000001), ref: 00D8017B
                                            • SetDlgItemTextW.USER32(?,00000067,?), ref: 00D801B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ItemText$DialogWindow
                                            • String ID: GETPASSWORD1
                                            • API String ID: 445417207-3292211884
                                            • Opcode ID: 22f652d9769f45215aa601ca98ee92832f972eb245f39d9a9445df55e72857b8
                                            • Instruction ID: 56896eae7b2a080013c230f6fc4290b355f6d4b7b1e99068a2e636cdfaf08639
                                            • Opcode Fuzzy Hash: 22f652d9769f45215aa601ca98ee92832f972eb245f39d9a9445df55e72857b8
                                            • Instruction Fuzzy Hash: 1D1108B2644314BBE270AB249C49FFB7BACEB85710F440429F745E3280CB7098098776
                                            APIs
                                              • Part of subcall function 00D75094: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00D750B3
                                              • Part of subcall function 00D75094: GetProcAddress.KERNEL32(00DB51F8,CryptUnprotectMemory), ref: 00D750C3
                                            • GetCurrentProcessId.KERNEL32(?,00000200,?,00D75104), ref: 00D75197
                                            Strings
                                            • CryptUnprotectMemory failed, xrefs: 00D7518F
                                            • CryptProtectMemory failed, xrefs: 00D7514E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: AddressProc$CurrentProcess
                                            • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                            • API String ID: 2190909847-396321323
                                            • Opcode ID: a439c9f081b710fe561044dc1d9a81561746461deff725bb2682f63f1f9665a0
                                            • Instruction ID: 6876a5dab81721a02f0a9aa33cd6f252d69f8150f3859ec2bc2e0a015dbfc4e6
                                            • Opcode Fuzzy Hash: a439c9f081b710fe561044dc1d9a81561746461deff725bb2682f63f1f9665a0
                                            • Instruction Fuzzy Hash: F4112931A02B24ABDF169F20FC1176E3B55EF40761B48C116FC0A9B349EBB09D0186FA
                                            APIs
                                            • IsWindowVisible.USER32(00010444), ref: 00D84291
                                            • DialogBoxParamW.USER32(GETPASSWORD1,00010444,00D80110,?), ref: 00D842BA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: DialogParamVisibleWindow
                                            • String ID: GETPASSWORD1
                                            • API String ID: 3157717868-3292211884
                                            • Opcode ID: fbfaf68aad4c852187a13f2cbc0dc7b53cfdc5ff4617bf5d752fec775655601d
                                            • Instruction ID: 76feda37d602c21b040c2acad63e27866fd6dfeb93dd010fbe9023bbe1b3cb09
                                            • Opcode Fuzzy Hash: fbfaf68aad4c852187a13f2cbc0dc7b53cfdc5ff4617bf5d752fec775655601d
                                            • Instruction Fuzzy Hash: 2201B93169A716FFCB11BB64AC56FAA37D8EB02311B444215F842D3395CAA09848DB75
                                            APIs
                                              • Part of subcall function 00D73EAA: _swprintf.LIBCMT ref: 00D73EEA
                                              • Part of subcall function 00D73EAA: _strlen.LIBCMT ref: 00D73F0B
                                              • Part of subcall function 00D73EAA: SetDlgItemTextW.USER32(?,00DA919C,?), ref: 00D73F64
                                              • Part of subcall function 00D73EAA: GetWindowRect.USER32(?,?), ref: 00D73F9A
                                              • Part of subcall function 00D73EAA: GetClientRect.USER32(?,?), ref: 00D73FA6
                                            • GetDlgItem.USER32(00000000,00003021), ref: 00D61E88
                                            • SetWindowTextW.USER32(00000000,00D9C6C8), ref: 00D61E9E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                            • String ID: 0
                                            • API String ID: 2622349952-4108050209
                                            • Opcode ID: 996b2b96e0f80b38ab5286d24b976d96d432046d36669609c9bc7e3c16c69506
                                            • Instruction ID: a42604292627c6f9c8799be25ce7ebb39bd3e595e46386938b4b60c0c4181a51
                                            • Opcode Fuzzy Hash: 996b2b96e0f80b38ab5286d24b976d96d432046d36669609c9bc7e3c16c69506
                                            • Instruction Fuzzy Hash: 69F0C234544348EBDF155F64DE0ABFA3B58AF15344F0C9254FC48942A2C776CA94EB70
                                            APIs
                                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00D85379
                                              • Part of subcall function 00D852FB: std::exception::exception.LIBCONCRT ref: 00D85308
                                              • Part of subcall function 00D8734A: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,00D8536C,?,00DA6C54,?), ref: 00D873AA
                                            • ___delayLoadHelper2@8.DELAYIMP ref: 00D8539F
                                              • Part of subcall function 00D84FCE: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00D85041
                                              • Part of subcall function 00D84FCE: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00D85052
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ExceptionRaise$AccessDloadHelper2@8LoadReleaseSectionWrite___delaystd::exception::exceptionstd::invalid_argument::invalid_argument
                                            • String ID: @Ut
                                            • API String ID: 1552410523-141846247
                                            • Opcode ID: cc52b0ec56d9b08f725590379c815267a67b3eb7e6a0eca5a77aa54ba1dca1f9
                                            • Instruction ID: 45e02e4dd8da0a651f70a83cff1d6198ecb6ac3285fbcbd1be5f016628606f69
                                            • Opcode Fuzzy Hash: cc52b0ec56d9b08f725590379c815267a67b3eb7e6a0eca5a77aa54ba1dca1f9
                                            • Instruction Fuzzy Hash: E3D05B6690C10CFED704B6D0ED06D7D372CDE41700F204415B950D1485E9A0D50957B5
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF,00D7770A,?,?,00D7777F,?,?,?,?,?,00D77769), ref: 00D775F3
                                            • GetLastError.KERNEL32(?,?,00D7777F,?,?,?,?,?,00D77769), ref: 00D775FF
                                              • Part of subcall function 00D692EB: __EH_prolog3_GS.LIBCMT ref: 00D692F2
                                            Strings
                                            • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00D77608
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: ErrorH_prolog3_LastObjectSingleWait
                                            • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                            • API String ID: 2419225763-2248577382
                                            • Opcode ID: 9ac477e379b5c18aeab7401dc8d2eb6dad18383d4f118a0dc29c36ee920b1286
                                            • Instruction ID: 18ff694e4604f8a41ab7b88e54f93640491c380b55172702639996d3d6aaad1d
                                            • Opcode Fuzzy Hash: 9ac477e379b5c18aeab7401dc8d2eb6dad18383d4f118a0dc29c36ee920b1286
                                            • Instruction Fuzzy Hash: 1FD05E31608621BBDA5023695C5ACAEBA09DB56330FA00715F63CA53E9DA20084182BD
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,00000000,?,00000000,00200000,?,?,00000000,0000005C,7889FE40), ref: 00D73E65
                                            • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00D73E73
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2214866100.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                            • Associated: 00000000.00000002.2214850762.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214894429.0000000000D9C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214912329.0000000000DB2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2214947026.0000000000DB7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d60000_1wYGO0mAN2.jbxd
                                            Similarity
                                            • API ID: FindHandleModuleResource
                                            • String ID: RTL
                                            • API String ID: 3537982541-834975271
                                            • Opcode ID: 1863f83e7dfbaef8f3437a47a9d09aa3fdde2b3de296ace0431e5d1fa69fe5da
                                            • Instruction ID: cd09523b6002d4b5925b0712ae1cf7b78058eb58ef38bc55abbdc8e5d54cc823
                                            • Opcode Fuzzy Hash: 1863f83e7dfbaef8f3437a47a9d09aa3fdde2b3de296ace0431e5d1fa69fe5da
                                            • Instruction Fuzzy Hash: 92C080317503109BE73017717C0DB872D585B04715F09245DB50DD91C0D5E5D4508BF0

                                            Execution Graph

                                            Execution Coverage:3.6%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:3.1%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:49
                                            execution_graph 92171 4e0e6f 92172 4e0e83 92171->92172 92178 4e13d5 92171->92178 92173 4e0e95 92172->92173 92281 4f016b 92172->92281 92174 5255d0 92173->92174 92177 4e0eee 92173->92177 92290 4db3fe 92173->92290 92298 541a29 8 API calls 92174->92298 92183 4e044d ISource 92177->92183 92214 4e2ad0 92177->92214 92178->92173 92294 4dbe6d 92178->92294 92182 5262cf 92302 543ef6 81 API calls __wsopen_s 92182->92302 92185 4e1645 92185->92183 92190 4dbe6d 8 API calls 92185->92190 92186 4f016b 8 API calls 92203 4e0326 ISource 92186->92203 92188 525c7f 92188->92183 92193 4dbe6d 8 API calls 92188->92193 92189 5261fe 92301 543ef6 81 API calls __wsopen_s 92189->92301 92190->92183 92193->92183 92194 4dbe6d 8 API calls 92194->92203 92196 4f05d2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 92196->92203 92197 4dbf07 8 API calls 92197->92203 92198 5260b9 92299 543ef6 81 API calls __wsopen_s 92198->92299 92199 4e0a5e ISource 92300 543ef6 81 API calls __wsopen_s 92199->92300 92201 4f0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 92201->92203 92202 4f0433 29 API calls pre_c_initialization 92202->92203 92203->92182 92203->92183 92203->92185 92203->92186 92203->92188 92203->92189 92203->92194 92203->92196 92203->92197 92203->92198 92203->92199 92203->92201 92203->92202 92204 4e1e00 92203->92204 92280 4e1940 230 API calls 2 library calls 92203->92280 92207 4e1e1d ISource 92204->92207 92205 4e24c2 92210 4e1fa7 ISource 92205->92210 92306 4ebd82 39 API calls 92205->92306 92207->92205 92209 5277db 92207->92209 92207->92210 92213 52760f 92207->92213 92304 4ee29c 8 API calls ISource 92207->92304 92209->92210 92305 4fd2f5 39 API calls 92209->92305 92210->92203 92303 4fd2f5 39 API calls 92213->92303 92215 4e2b36 92214->92215 92216 4e2f70 92214->92216 92218 527b7c 92215->92218 92219 4e2b50 92215->92219 92531 4f05d2 5 API calls __Init_thread_wait 92216->92531 92541 5579f9 230 API calls 92218->92541 92307 4e30e0 92219->92307 92221 4e2f7a 92224 4e2fbb 92221->92224 92532 4db25f 92221->92532 92223 527b88 92223->92203 92229 527b91 92224->92229 92231 4e2fec 92224->92231 92227 4e30e0 9 API calls 92228 4e2b76 92227->92228 92228->92224 92230 4e2bac 92228->92230 92542 543ef6 81 API calls __wsopen_s 92229->92542 92230->92229 92254 4e2bc8 __fread_nolock 92230->92254 92233 4db3fe 8 API calls 92231->92233 92235 4e2ff9 92233->92235 92234 4e2f94 92538 4f0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92234->92538 92539 4ee662 230 API calls 92235->92539 92237 527bb9 92543 543ef6 81 API calls __wsopen_s 92237->92543 92240 4e2cef 92241 4e2cfc 92240->92241 92242 527c1c 92240->92242 92244 4e30e0 9 API calls 92241->92244 92545 5560a2 53 API calls _wcslen 92242->92545 92246 4e2d09 92244->92246 92245 4f016b 8 API calls 92245->92254 92249 527d45 92246->92249 92251 4e30e0 9 API calls 92246->92251 92247 4e3032 92540 4efe59 8 API calls 92247->92540 92258 527bb4 92249->92258 92546 543ef6 81 API calls __wsopen_s 92249->92546 92256 4e2d23 92251->92256 92254->92235 92254->92237 92254->92240 92254->92245 92255 527bfd 92254->92255 92254->92258 92317 4e02f0 92254->92317 92521 4f019b 92254->92521 92544 543ef6 81 API calls __wsopen_s 92255->92544 92256->92249 92259 4dbe6d 8 API calls 92256->92259 92261 4e2d87 ISource 92256->92261 92258->92203 92259->92261 92260 4e30e0 9 API calls 92260->92261 92261->92247 92261->92249 92261->92258 92261->92260 92264 4e2e3b ISource 92261->92264 92340 55ac49 92261->92340 92345 559eea 92261->92345 92348 54874a 92261->92348 92375 4d7953 92261->92375 92379 5465b4 92261->92379 92384 55a4b4 92261->92384 92390 546d2d 92261->92390 92403 544ad5 92261->92403 92408 54de5d 92261->92408 92413 5495f6 92261->92413 92428 4ef95e 92261->92428 92435 548e39 92261->92435 92454 53e9c5 GetFileAttributesW 92261->92454 92456 55a8ae 92261->92456 92464 4ebe75 92261->92464 92262 4e2edd 92262->92203 92264->92262 92530 4ee29c 8 API calls ISource 92264->92530 92280->92203 92283 4f0170 ___std_exception_copy 92281->92283 92282 4f018a 92282->92173 92283->92282 92286 4f018c 92283->92286 93213 4f523d 7 API calls 2 library calls 92283->93213 92285 4f09fd 93215 4f3634 RaiseException 92285->93215 92286->92285 93214 4f3634 RaiseException 92286->93214 92289 4f0a1a 92289->92173 92291 4db40c 92290->92291 92293 4db412 92290->92293 92292 4dbe6d 8 API calls 92291->92292 92291->92293 92292->92293 92293->92173 92295 4dbe90 __fread_nolock 92294->92295 92296 4dbe81 92294->92296 92295->92173 92296->92295 92297 4f019b 8 API calls 92296->92297 92297->92295 92298->92183 92299->92199 92300->92183 92301->92183 92302->92183 92303->92213 92304->92207 92305->92210 92306->92210 92308 4e3121 92307->92308 92310 4e30fd 92307->92310 92547 4f05d2 5 API calls __Init_thread_wait 92308->92547 92309 4e2b60 92309->92227 92310->92309 92549 4f05d2 5 API calls __Init_thread_wait 92310->92549 92312 4e312b 92312->92310 92548 4f0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92312->92548 92314 4e9ec7 92314->92309 92550 4f0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92314->92550 92324 4e0326 ISource 92317->92324 92318 4f0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 92318->92324 92319 5262cf 92555 543ef6 81 API calls __wsopen_s 92319->92555 92320 4e1e00 40 API calls 92320->92324 92321 4e1645 92328 4dbe6d 8 API calls 92321->92328 92333 4e044d ISource 92321->92333 92322 4f016b 8 API calls 92322->92324 92324->92318 92324->92319 92324->92320 92324->92321 92324->92322 92325 525c7f 92324->92325 92326 5261fe 92324->92326 92327 4dbe6d 8 API calls 92324->92327 92324->92333 92334 4f05d2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 92324->92334 92335 4dbf07 8 API calls 92324->92335 92336 4f0433 29 API calls pre_c_initialization 92324->92336 92337 5260b9 92324->92337 92339 4e0a5e ISource 92324->92339 92551 4e1940 230 API calls 2 library calls 92324->92551 92332 4dbe6d 8 API calls 92325->92332 92325->92333 92554 543ef6 81 API calls __wsopen_s 92326->92554 92327->92324 92328->92333 92332->92333 92333->92254 92334->92324 92335->92324 92336->92324 92552 543ef6 81 API calls __wsopen_s 92337->92552 92553 543ef6 81 API calls __wsopen_s 92339->92553 92556 4d8e70 92340->92556 92344 55ac74 92344->92261 92721 5588b6 92345->92721 92347 559efa 92347->92261 92349 54875a __wsopen_s 92348->92349 92350 4d8e70 52 API calls 92349->92350 92351 54877b 92350->92351 92361 548799 92351->92361 92889 4dc92d 92351->92889 92353 4d8e70 52 API calls 92354 54887c 92353->92354 92871 4d557e 92354->92871 92358 5488cd 92359 5488f7 GetCurrentDirectoryW SetCurrentDirectoryW 92358->92359 92360 548921 92359->92360 92364 548973 92359->92364 92884 53e387 lstrlenW 92360->92884 92361->92353 92361->92364 92364->92261 92365 53e9c5 GetFileAttributesW 92366 548938 92365->92366 92367 548940 GetFileAttributesW SetFileAttributesW 92366->92367 92373 5489cb 92366->92373 92368 5489b1 92367->92368 92369 548969 SetCurrentDirectoryW 92367->92369 92370 5489b5 SetCurrentDirectoryW 92368->92370 92371 548a02 SetCurrentDirectoryW 92368->92371 92369->92364 92370->92373 92371->92364 92894 549f9f 11 API calls 92373->92894 92374 5489ea 92374->92371 92376 4d795d 92375->92376 92377 4d796c 92375->92377 92376->92261 92377->92376 92378 4d7971 CloseHandle 92377->92378 92378->92376 92380 4d8e70 52 API calls 92379->92380 92381 5465c7 92380->92381 92382 53e387 4 API calls 92381->92382 92383 5465d1 92382->92383 92383->92261 92388 55a4c7 92384->92388 92385 4d8e70 52 API calls 92386 55a534 92385->92386 92932 5417be 92386->92932 92388->92385 92389 55a4d6 92388->92389 92389->92261 92391 4d8e70 52 API calls 92390->92391 92392 546d47 92391->92392 92393 546d84 92392->92393 92394 4dc92d 39 API calls 92392->92394 92973 53e783 92393->92973 92396 546d76 92394->92396 92396->92393 92398 4d557e 9 API calls 92396->92398 92397 546d92 92978 4d7a59 8 API calls 92397->92978 92398->92393 92401 4d8e70 52 API calls 92401->92397 92402 546dd7 92402->92261 92404 4d8e70 52 API calls 92403->92404 92405 544ae8 92404->92405 92979 53da81 92405->92979 92407 544af0 92407->92261 92409 4db3fe 8 API calls 92408->92409 92410 54de70 92409->92410 92991 54183b 92410->92991 92412 54de78 92412->92261 92414 4dbf07 8 API calls 92413->92414 92415 549607 92414->92415 92416 4d8e70 52 API calls 92415->92416 92417 549616 92416->92417 92418 4d557e 9 API calls 92417->92418 92419 549621 92418->92419 92420 4d8e70 52 API calls 92419->92420 92421 54962e 92420->92421 92422 4d8e70 52 API calls 92421->92422 92423 549640 92422->92423 92424 4d8e70 52 API calls 92423->92424 92425 549655 WritePrivateProfileStringW 92424->92425 92426 549677 92425->92426 92427 54966b WritePrivateProfileStringW 92425->92427 92426->92261 92427->92426 92429 4dc92d 39 API calls 92428->92429 92430 4ef972 92429->92430 92431 52fac0 Sleep 92430->92431 92432 4ef97a timeGetTime 92430->92432 92433 4dc92d 39 API calls 92432->92433 92434 4ef990 92433->92434 92434->92261 92436 4dbf07 8 API calls 92435->92436 92437 548e4a 92436->92437 92438 4f019b 8 API calls 92437->92438 92439 548e54 92438->92439 93016 4d41a6 92439->93016 92442 4d8e70 52 API calls 92443 548e6d 92442->92443 92444 4d557e 9 API calls 92443->92444 92445 548e78 92444->92445 92446 4d8e70 52 API calls 92445->92446 92447 548e85 92446->92447 92448 4d8e70 52 API calls 92447->92448 92449 548e97 92448->92449 92450 4d8e70 52 API calls 92449->92450 92451 548eac GetPrivateProfileStringW 92450->92451 92452 4d6ab6 8 API calls 92451->92452 92453 548ecf ISource 92452->92453 92453->92261 92455 53e9d1 92454->92455 92455->92261 92457 55a90a 92456->92457 92463 55a8ca 92456->92463 92458 55a928 92457->92458 92460 4dc92d 39 API calls 92457->92460 92459 4dc92d 39 API calls 92458->92459 92461 55a990 92458->92461 92458->92463 92459->92461 92460->92458 93019 540287 92461->93019 92463->92261 92465 4d6ab6 8 API calls 92464->92465 92466 4ebe8d 92465->92466 92468 4f016b 8 API calls 92466->92468 92471 528f7a 92466->92471 92469 4ebea6 92468->92469 92470 4f019b 8 API calls 92469->92470 92472 4ebeb7 92470->92472 92511 4ebf1f 92471->92511 93142 54a607 39 API calls 92471->93142 92473 4d7953 CloseHandle 92472->92473 92474 4ebec2 92473->92474 92476 4dbf07 8 API calls 92474->92476 92475 4dc92d 39 API calls 92477 528fdc 92475->92477 92478 4ebeca 92476->92478 92479 4ebf2c 92477->92479 92480 528fe4 92477->92480 92481 4d7953 CloseHandle 92478->92481 93113 4efdc9 92479->93113 92483 4dc92d 39 API calls 92480->92483 92484 4ebed1 92481->92484 92488 4ebf33 92483->92488 92485 4d8e70 52 API calls 92484->92485 92486 4ebedd 92485->92486 92487 4d7953 CloseHandle 92486->92487 92489 4ebee7 92487->92489 92490 4ebf4e 92488->92490 92491 528ff9 92488->92491 93090 4d6e52 92489->93090 93118 4d7a14 92490->93118 92494 4f019b 8 API calls 92491->92494 92497 528ffe 92494->92497 92498 529012 92497->92498 93143 4d41c9 92497->93143 92504 541759 8 API calls 92498->92504 92509 529016 __fread_nolock 92498->92509 92499 528f72 93141 4d7923 CloseHandle ISource 92499->93141 92500 4ebf00 93098 4d6b12 92500->93098 92502 4ebf65 92502->92509 93138 4d7a59 8 API calls 92502->93138 92504->92509 92508 4ebf0e 93137 4d6afb SetFilePointerEx SetFilePointerEx SetFilePointerEx 92508->93137 92511->92475 92511->92479 92512 4ebf15 92512->92511 92513 528f3b 92512->92513 93140 53d4bf SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 92513->93140 92514 4ebfb3 92514->92261 92515 4ebf79 92515->92514 92516 4d7953 CloseHandle 92515->92516 92518 4ebfa7 92516->92518 92518->92514 93139 4d7923 CloseHandle ISource 92518->93139 92519 528f52 92519->92511 92522 4f016b ___std_exception_copy 92521->92522 92523 4f018a 92522->92523 92526 4f018c 92522->92526 93210 4f523d 7 API calls 2 library calls 92522->93210 92523->92254 92525 4f09fd 93212 4f3634 RaiseException 92525->93212 92526->92525 93211 4f3634 RaiseException 92526->93211 92529 4f0a1a 92529->92254 92530->92264 92531->92221 92533 4db26e _wcslen 92532->92533 92534 4f019b 8 API calls 92533->92534 92535 4db296 __fread_nolock 92534->92535 92536 4f016b 8 API calls 92535->92536 92537 4db2ac 92536->92537 92537->92234 92538->92224 92539->92247 92540->92247 92541->92223 92542->92258 92543->92258 92544->92258 92545->92256 92546->92258 92547->92312 92548->92310 92549->92314 92550->92309 92551->92324 92552->92339 92553->92333 92554->92333 92555->92333 92557 4d8e85 92556->92557 92574 4d8e82 92556->92574 92558 4d8e8d 92557->92558 92559 4d8ebb 92557->92559 92589 4f5556 26 API calls 92558->92589 92560 516b10 92559->92560 92564 4d8ecd 92559->92564 92565 516a29 92559->92565 92592 4f5513 26 API calls 92560->92592 92562 4d8e9d 92568 4f016b 8 API calls 92562->92568 92590 4efe8f 51 API calls 92564->92590 92571 516aa2 92565->92571 92573 4f019b 8 API calls 92565->92573 92566 516b28 92566->92566 92570 4d8ea7 92568->92570 92572 4db25f 8 API calls 92570->92572 92591 4efe8f 51 API calls 92571->92591 92572->92574 92575 516a72 92573->92575 92579 53dc9c CreateToolhelp32Snapshot Process32FirstW 92574->92579 92576 4f016b 8 API calls 92575->92576 92577 516a99 92576->92577 92578 4db25f 8 API calls 92577->92578 92578->92571 92593 53e723 92579->92593 92581 53dd9b CloseHandle 92581->92344 92582 53dce9 Process32NextW 92582->92581 92588 53dce2 92582->92588 92583 4dbf07 8 API calls 92583->92588 92584 4db25f 8 API calls 92584->92588 92588->92581 92588->92582 92588->92583 92588->92584 92599 4d694e 92588->92599 92641 4d7af4 92588->92641 92650 4ee2e5 41 API calls 92588->92650 92589->92562 92590->92562 92591->92560 92592->92566 92597 53e72e 92593->92597 92594 53e745 92652 4f668b 39 API calls 92594->92652 92597->92594 92598 53e74b 92597->92598 92651 4f6742 GetStringTypeW 92597->92651 92598->92588 92653 4dbf07 92599->92653 92602 4dbf07 8 API calls 92603 4d696c 92602->92603 92604 4dbf07 8 API calls 92603->92604 92605 4d6974 92604->92605 92606 4dbf07 8 API calls 92605->92606 92607 4d697c 92606->92607 92608 515725 92607->92608 92609 4d69b0 92607->92609 92610 4dbe6d 8 API calls 92608->92610 92611 4d8685 8 API calls 92609->92611 92612 51572e 92610->92612 92613 4d69be 92611->92613 92678 4dbceb 92612->92678 92671 4d96d9 92613->92671 92616 4d69c8 92617 4d69f3 92616->92617 92618 4d8685 8 API calls 92616->92618 92619 4d6a14 92617->92619 92633 4d6a38 92617->92633 92636 515750 92617->92636 92621 4d69e9 92618->92621 92619->92633 92675 4d627c 92619->92675 92623 4d96d9 8 API calls 92621->92623 92622 4d6a49 92624 4d6a5f 92622->92624 92628 4dbe6d 8 API calls 92622->92628 92623->92617 92629 4dbe6d 8 API calls 92624->92629 92631 4d6a73 92624->92631 92628->92624 92629->92631 92630 4d6a7e 92635 4dbe6d 8 API calls 92630->92635 92639 4d6a89 92630->92639 92631->92630 92634 4dbe6d 8 API calls 92631->92634 92632 4d8685 8 API calls 92632->92633 92658 4d8685 92633->92658 92634->92630 92635->92639 92684 4d84b7 92636->92684 92637 4d627c 8 API calls 92638 515810 92637->92638 92638->92633 92638->92637 92696 4dacc0 8 API calls __fread_nolock 92638->92696 92639->92588 92642 5163b3 92641->92642 92643 4d7b06 92641->92643 92715 4d662b 8 API calls __fread_nolock 92642->92715 92705 4d7b17 92643->92705 92646 4d7b12 92646->92588 92647 5163bd 92648 5163c9 92647->92648 92649 4dbe6d 8 API calls 92647->92649 92649->92648 92650->92588 92651->92597 92652->92598 92654 4f019b 8 API calls 92653->92654 92655 4dbf1c 92654->92655 92656 4f016b 8 API calls 92655->92656 92657 4d6964 92656->92657 92657->92602 92659 4d8694 92658->92659 92660 4d86f1 92658->92660 92659->92660 92662 4d869f 92659->92662 92661 4d96d9 8 API calls 92660->92661 92663 4d86c2 __fread_nolock 92661->92663 92664 5166b7 92662->92664 92665 4d86ba 92662->92665 92663->92622 92666 4f016b 8 API calls 92664->92666 92697 4d8894 8 API calls 92665->92697 92668 5166c1 92666->92668 92669 4f019b 8 API calls 92668->92669 92670 5166f4 92669->92670 92672 4d96e7 92671->92672 92674 4d96f0 __fread_nolock 92671->92674 92672->92674 92698 4dc269 92672->92698 92674->92616 92676 4dc269 8 API calls 92675->92676 92677 4d6287 92676->92677 92677->92632 92677->92633 92679 4dbcf8 92678->92679 92680 4dbd05 92678->92680 92679->92617 92681 4f016b 8 API calls 92680->92681 92682 4dbd0f 92681->92682 92683 4f019b 8 API calls 92682->92683 92683->92679 92685 5165bb 92684->92685 92686 4d84c7 _wcslen 92684->92686 92687 4d96d9 8 API calls 92685->92687 92689 4d84dd 92686->92689 92690 4d8502 92686->92690 92688 5165c4 92687->92688 92688->92688 92704 4d8894 8 API calls 92689->92704 92691 4f016b 8 API calls 92690->92691 92693 4d850e 92691->92693 92695 4f019b 8 API calls 92693->92695 92694 4d84e5 __fread_nolock 92694->92638 92695->92694 92696->92638 92697->92663 92699 4dc27c 92698->92699 92703 4dc279 __fread_nolock 92698->92703 92700 4f016b 8 API calls 92699->92700 92701 4dc287 92700->92701 92702 4f019b 8 API calls 92701->92702 92702->92703 92703->92674 92704->92694 92706 4d7b26 92705->92706 92712 4d7b5a __fread_nolock 92705->92712 92707 5163e4 92706->92707 92708 4d7b4d 92706->92708 92706->92712 92709 4f016b 8 API calls 92707->92709 92716 4d7cb3 92708->92716 92711 5163f3 92709->92711 92713 4f019b 8 API calls 92711->92713 92712->92646 92714 516427 __fread_nolock 92713->92714 92715->92647 92717 4d7cc9 92716->92717 92720 4d7cc4 __fread_nolock 92716->92720 92718 5164be 92717->92718 92719 4f019b 8 API calls 92717->92719 92719->92720 92720->92712 92722 4d8e70 52 API calls 92721->92722 92723 5588ed 92722->92723 92746 558932 ISource 92723->92746 92759 559632 92723->92759 92725 558bde 92726 558dac 92725->92726 92731 558bec 92725->92731 92826 559843 59 API calls 92726->92826 92729 558dbb 92730 558dc7 92729->92730 92729->92731 92730->92746 92772 5587e3 92731->92772 92732 4d8e70 52 API calls 92748 5589a6 92732->92748 92737 558c25 92786 4f0000 92737->92786 92740 558c45 92825 543ef6 81 API calls __wsopen_s 92740->92825 92741 558c5f 92790 4d7d51 92741->92790 92744 558c50 GetCurrentProcess TerminateProcess 92744->92741 92746->92347 92748->92725 92748->92732 92748->92746 92823 534a0c 8 API calls __fread_nolock 92748->92823 92824 558e7c 41 API calls 92748->92824 92750 4e1c50 8 API calls 92752 558c9e 92750->92752 92751 558e22 92751->92746 92755 558e36 FreeLibrary 92751->92755 92753 5594da 74 API calls 92752->92753 92757 558caf 92753->92757 92755->92746 92757->92751 92758 4db3fe 8 API calls 92757->92758 92801 4e1c50 92757->92801 92812 5594da 92757->92812 92758->92757 92760 4dc269 8 API calls 92759->92760 92761 55964d CharLowerBuffW 92760->92761 92827 5396e3 92761->92827 92765 4dbf07 8 API calls 92766 559689 92765->92766 92767 4d8685 8 API calls 92766->92767 92768 55969d 92767->92768 92769 4d96d9 8 API calls 92768->92769 92771 5596a7 _wcslen 92769->92771 92770 5597bd _wcslen 92770->92748 92771->92770 92834 558e7c 41 API calls 92771->92834 92773 5587fe 92772->92773 92774 558849 92772->92774 92775 4f019b 8 API calls 92773->92775 92778 5599f5 92774->92778 92776 558820 92775->92776 92776->92774 92777 4f016b 8 API calls 92776->92777 92777->92776 92779 559c0a ISource 92778->92779 92784 559a19 _strcat _wcslen ___std_exception_copy 92778->92784 92779->92737 92780 4dc92d 39 API calls 92780->92784 92781 4dc5df 39 API calls 92781->92784 92782 4dc9fb 39 API calls 92782->92784 92783 4d8e70 52 API calls 92783->92784 92784->92779 92784->92780 92784->92781 92784->92782 92784->92783 92837 53f7da 10 API calls _wcslen 92784->92837 92788 4f0015 92786->92788 92787 4f00ad ResumeThread 92789 4f007b 92787->92789 92788->92787 92788->92789 92789->92740 92789->92741 92791 4d7d59 92790->92791 92792 4f016b 8 API calls 92791->92792 92793 4d7d67 92792->92793 92838 4d8386 92793->92838 92796 4d83b0 92841 4dc700 92796->92841 92798 4f019b 8 API calls 92800 4d845c 92798->92800 92799 4d83c0 92799->92798 92799->92800 92800->92750 92800->92757 92802 4e1c62 92801->92802 92806 4e1c6b 92802->92806 92854 4eb71c 8 API calls 92802->92854 92804 4e1d20 92804->92757 92805 4f016b 8 API calls 92807 4e1d89 92805->92807 92806->92804 92806->92805 92808 4f016b 8 API calls 92807->92808 92809 4e1d92 92808->92809 92810 4db25f 8 API calls 92809->92810 92811 4e1da1 92810->92811 92811->92757 92813 5594f2 92812->92813 92817 55950e 92812->92817 92814 5595c3 92813->92814 92815 5594f9 92813->92815 92816 55951a 92813->92816 92813->92817 92870 5415b3 72 API calls ISource 92814->92870 92855 53f3fd 10 API calls _strlen 92815->92855 92820 4d6ab6 8 API calls 92816->92820 92817->92757 92820->92817 92821 559503 92856 4d6ab6 92821->92856 92823->92748 92824->92748 92825->92744 92826->92729 92828 539703 _wcslen 92827->92828 92829 5397f2 92828->92829 92832 539738 92828->92832 92833 5397f7 92828->92833 92829->92765 92829->92771 92832->92829 92835 4ee2e5 41 API calls 92832->92835 92833->92829 92836 4ee2e5 41 API calls 92833->92836 92834->92770 92835->92832 92836->92833 92837->92784 92839 4f016b 8 API calls 92838->92839 92840 4d7d6f 92839->92840 92840->92796 92842 4dc70b 92841->92842 92843 521228 92842->92843 92848 4dc713 ISource 92842->92848 92844 4f016b 8 API calls 92843->92844 92846 521234 92844->92846 92845 4dc71a 92845->92799 92848->92845 92849 4dc780 92848->92849 92850 4dc78b ISource 92849->92850 92852 4dc7c6 ISource 92850->92852 92853 4ee29c 8 API calls ISource 92850->92853 92852->92848 92853->92852 92854->92806 92855->92821 92857 51587b 92856->92857 92858 4d6ac6 92856->92858 92859 4d84b7 8 API calls 92857->92859 92861 51588c 92857->92861 92863 4f016b 8 API calls 92858->92863 92859->92861 92860 4dbceb 8 API calls 92862 515896 92860->92862 92861->92860 92862->92862 92864 4d6ad9 92863->92864 92865 4d6af4 92864->92865 92866 4d6ae2 92864->92866 92868 4dbf07 8 API calls 92865->92868 92867 4db25f 8 API calls 92866->92867 92869 4d6aea 92867->92869 92868->92869 92869->92817 92870->92817 92895 5122f0 92871->92895 92874 4d55aa 92876 4d84b7 8 API calls 92874->92876 92875 4d55c5 92877 4dbceb 8 API calls 92875->92877 92878 4d55b6 92876->92878 92877->92878 92897 4d79ed 92878->92897 92881 4fd913 92901 4fd6be 92881->92901 92885 53e3a5 GetFileAttributesW 92884->92885 92886 53e3cf 92884->92886 92885->92886 92887 53e3b1 FindFirstFileW 92885->92887 92886->92364 92886->92365 92887->92886 92888 53e3c2 FindClose 92887->92888 92888->92886 92890 4dc93e 92889->92890 92891 4dc945 92889->92891 92890->92891 92931 4f6661 39 API calls 92890->92931 92891->92361 92893 4dc988 92893->92361 92894->92374 92896 4d558b GetFullPathNameW 92895->92896 92896->92874 92896->92875 92898 4d79fb 92897->92898 92899 4d96d9 8 API calls 92898->92899 92900 4d55c2 92899->92900 92900->92881 92902 4fd89f 92901->92902 92903 4fd6d5 92901->92903 92929 4ff669 20 API calls _abort 92902->92929 92903->92902 92907 4fd740 92903->92907 92905 4fd8af 92930 502b7c 26 API calls _strftime 92905->92930 92908 4fd764 92907->92908 92909 4fd78b 92907->92909 92924 505153 26 API calls 2 library calls 92907->92924 92923 4ff669 20 API calls _abort 92908->92923 92909->92908 92916 4fd7fd 92909->92916 92925 505153 26 API calls 2 library calls 92909->92925 92911 4fd868 92911->92908 92913 4fd87b 92911->92913 92918 4fd774 92911->92918 92928 505153 26 API calls 2 library calls 92913->92928 92914 4fd820 92914->92908 92915 4fd841 92914->92915 92926 505153 26 API calls 2 library calls 92914->92926 92915->92908 92915->92918 92920 4fd857 92915->92920 92916->92911 92916->92914 92918->92358 92927 505153 26 API calls 2 library calls 92920->92927 92923->92918 92924->92909 92925->92916 92926->92915 92927->92918 92928->92918 92929->92905 92930->92918 92931->92893 92933 5417cb 92932->92933 92934 4f016b 8 API calls 92933->92934 92935 5417d2 92934->92935 92938 53fbca 92935->92938 92937 54180c 92937->92389 92939 4dc269 8 API calls 92938->92939 92940 53fbdd CharLowerBuffW 92939->92940 92943 53fbf0 92940->92943 92941 4d627c 8 API calls 92941->92943 92942 53fbfa ___scrt_fastfail 92942->92937 92943->92941 92943->92942 92944 53fc2e 92943->92944 92945 53fc40 92944->92945 92947 4d627c 8 API calls 92944->92947 92946 4f019b 8 API calls 92945->92946 92951 53fc6e 92946->92951 92947->92945 92948 53fc90 92956 53fd21 92948->92956 92951->92948 92971 53fb02 8 API calls 92951->92971 92952 53fccd 92952->92942 92953 4f016b 8 API calls 92952->92953 92954 53fce7 92953->92954 92955 4f019b 8 API calls 92954->92955 92955->92942 92957 4dbf07 8 API calls 92956->92957 92958 53fd53 92957->92958 92959 4dbf07 8 API calls 92958->92959 92960 53fd5c 92959->92960 92961 4dbf07 8 API calls 92960->92961 92963 53fd65 92961->92963 92962 540029 92962->92952 92963->92962 92964 4d84b7 8 API calls 92963->92964 92965 4f6718 GetStringTypeW 92963->92965 92967 4f6661 39 API calls 92963->92967 92968 53fd21 40 API calls 92963->92968 92969 4dacc0 8 API calls 92963->92969 92970 4dbe6d 8 API calls 92963->92970 92972 4f6742 GetStringTypeW 92963->92972 92964->92963 92965->92963 92967->92963 92968->92963 92969->92963 92970->92963 92971->92951 92972->92963 92974 5122f0 __wsopen_s 92973->92974 92975 53e790 GetShortPathNameW 92974->92975 92976 4d84b7 8 API calls 92975->92976 92977 53e7b8 92976->92977 92977->92397 92977->92401 92978->92402 92980 4d79ed 8 API calls 92979->92980 92981 53dab6 GetFileAttributesW 92980->92981 92982 53daca GetLastError 92981->92982 92985 53dae3 92981->92985 92983 53dad7 CreateDirectoryW 92982->92983 92984 53dae5 92982->92984 92983->92984 92983->92985 92984->92985 92986 4d96d9 8 API calls 92984->92986 92985->92407 92987 53db27 92986->92987 92988 53da81 8 API calls 92987->92988 92989 53db30 92988->92989 92989->92985 92990 53db34 CreateDirectoryW 92989->92990 92990->92985 92992 541852 92991->92992 93007 54196b 92991->93007 92993 541872 92992->92993 92994 54189f 92992->92994 92996 5418b6 92992->92996 92993->92994 92997 541886 92993->92997 92995 4f019b 8 API calls 92994->92995 93009 541894 __fread_nolock 92995->93009 92999 4f019b 8 API calls 92996->92999 93005 5418d3 92996->93005 93000 4f019b 8 API calls 92997->93000 92998 5418fa 93001 4f019b 8 API calls 92998->93001 92999->93005 93000->93009 93002 541900 93001->93002 93010 4ec1f1 93002->93010 93003 4f016b 8 API calls 93003->93007 93005->92997 93005->92998 93005->93009 93007->92412 93009->93003 93011 4f019b 8 API calls 93010->93011 93012 4ec208 93011->93012 93013 4f016b 8 API calls 93012->93013 93014 4ec214 93013->93014 93015 4ef9e2 10 API calls 93014->93015 93015->93009 93017 4f016b 8 API calls 93016->93017 93018 4d41b8 93017->93018 93018->92442 93051 5401bf 93019->93051 93021 5402ae __fread_nolock 93021->92463 93023 540320 93026 540386 93023->93026 93029 540330 93023->93029 93024 540308 93067 5404fe 56 API calls __fread_nolock 93024->93067 93026->93021 93027 5403b6 93026->93027 93028 54041c 93026->93028 93032 5403e6 93027->93032 93034 5403bb 93027->93034 93030 540425 93028->93030 93033 5404c5 93028->93033 93031 540368 93029->93031 93068 54276a 10 API calls 93029->93068 93035 5404a2 93030->93035 93036 54042a 93030->93036 93058 541759 93031->93058 93032->93021 93072 4dc9fb 39 API calls 93032->93072 93033->93021 93076 4dc5df 39 API calls 93033->93076 93034->93021 93071 4dc9fb 39 API calls 93034->93071 93035->93021 93075 4dc5df 39 API calls 93035->93075 93041 540430 93036->93041 93042 540469 93036->93042 93041->93021 93073 4dc5df 39 API calls 93041->93073 93042->93021 93074 4dc5df 39 API calls 93042->93074 93046 54033c 93069 54276a 10 API calls 93046->93069 93049 540353 __fread_nolock 93070 54276a 10 API calls 93049->93070 93052 54020c 93051->93052 93053 5401d0 93051->93053 93054 4dc92d 39 API calls 93052->93054 93055 4d8e70 52 API calls 93053->93055 93056 54020a 93053->93056 93077 4f4db8 93053->93077 93054->93056 93055->93053 93056->93021 93056->93023 93056->93024 93059 541764 93058->93059 93060 4f016b 8 API calls 93059->93060 93061 54176b 93060->93061 93062 541777 93061->93062 93063 541798 93061->93063 93064 4f019b 8 API calls 93062->93064 93065 4f019b 8 API calls 93063->93065 93066 541780 ___scrt_fastfail 93064->93066 93065->93066 93066->93021 93067->93021 93068->93046 93069->93049 93070->93031 93071->93021 93072->93021 93073->93021 93074->93021 93075->93021 93076->93021 93078 4f4e3b 93077->93078 93079 4f4dc6 93077->93079 93089 4f4e4d 40 API calls 3 library calls 93078->93089 93086 4f4deb 93079->93086 93087 4ff669 20 API calls _abort 93079->93087 93082 4f4e48 93082->93053 93083 4f4dd2 93088 502b7c 26 API calls _strftime 93083->93088 93085 4f4ddd 93085->93053 93086->93053 93087->93083 93088->93085 93089->93082 93091 515985 93090->93091 93092 4d6e69 CreateFileW 93090->93092 93093 4d6e88 93091->93093 93094 51598b CreateFileW 93091->93094 93092->93093 93093->92499 93093->92500 93094->93093 93095 5159b3 93094->93095 93146 4d6bfa 93095->93146 93099 4d6b27 93098->93099 93112 4d6b24 ISource 93098->93112 93100 4d6bfa 3 API calls 93099->93100 93099->93112 93101 4d6b44 93100->93101 93102 51589b 93101->93102 93103 4d6b51 93101->93103 93104 4efdc9 3 API calls 93102->93104 93105 4f019b 8 API calls 93103->93105 93104->93112 93106 4d6b5d 93105->93106 93107 4d41a6 8 API calls 93106->93107 93108 4d6b67 93107->93108 93152 4db050 93108->93152 93111 4d6bfa 3 API calls 93111->93112 93112->92508 93114 4d6bfa 3 API calls 93113->93114 93115 4efde7 93114->93115 93116 4d6bfa 3 API calls 93115->93116 93117 4efe08 93116->93117 93117->92488 93119 4f019b 8 API calls 93118->93119 93120 4d7a39 93119->93120 93121 4f016b 8 API calls 93120->93121 93122 4d7a47 93121->93122 93123 4ebfbc 93122->93123 93124 4ebfc7 93123->93124 93125 4ec003 93123->93125 93124->93125 93128 4ebfd6 93124->93128 93126 4dbceb 8 API calls 93125->93126 93127 53d2ab 93126->93127 93135 53d2da 93127->93135 93167 53d249 93127->93167 93174 4dacc0 8 API calls __fread_nolock 93127->93174 93129 4ebfeb 93128->93129 93131 4ebff8 93128->93131 93159 4ec009 93129->93159 93166 53d3b2 12 API calls 93131->93166 93133 4ebff4 93133->92502 93135->92502 93137->92512 93138->92515 93139->92514 93140->92519 93141->92471 93142->92471 93144 4db050 2 API calls 93143->93144 93145 4d41da 93144->93145 93145->92498 93151 4d6c11 93146->93151 93147 4d6c98 SetFilePointerEx SetFilePointerEx 93149 4d6c64 93147->93149 93148 5158ec SetFilePointerEx 93149->93093 93150 5158db 93150->93148 93151->93147 93151->93148 93151->93149 93151->93150 93153 4db0cb 93152->93153 93157 4db05e 93152->93157 93158 4ef13c SetFilePointerEx 93153->93158 93154 4d6b73 93154->93111 93156 4db09c ReadFile 93156->93154 93156->93157 93157->93154 93157->93156 93158->93157 93160 4ec1f1 8 API calls 93159->93160 93161 4ec021 93160->93161 93175 4dadc1 93161->93175 93165 4ec03c 93165->93133 93166->93133 93168 53d253 93167->93168 93169 53d26a 93167->93169 93168->93169 93170 53d259 93168->93170 93171 4db050 2 API calls 93169->93171 93172 4db050 2 API calls 93170->93172 93173 53d263 93171->93173 93172->93173 93173->93127 93174->93127 93189 4efeaa 93175->93189 93177 4dae07 93177->93165 93181 4d8774 MultiByteToWideChar 93177->93181 93178 4db050 2 API calls 93179 4dadd2 93178->93179 93179->93177 93179->93178 93196 4db0e3 8 API calls __fread_nolock 93179->93196 93182 4d87e7 93181->93182 93183 4d87a0 93181->93183 93184 4dbceb 8 API calls 93182->93184 93185 4f019b 8 API calls 93183->93185 93188 4d87db 93184->93188 93186 4d87b5 MultiByteToWideChar 93185->93186 93197 4d87f0 93186->93197 93188->93165 93190 52fe13 93189->93190 93191 4efebb 93189->93191 93192 4f016b 8 API calls 93190->93192 93191->93179 93193 52fe1d 93192->93193 93194 4f019b 8 API calls 93193->93194 93195 52fe32 93194->93195 93196->93179 93198 4d8884 93197->93198 93199 4d8803 93197->93199 93200 4d96d9 8 API calls 93198->93200 93199->93198 93201 4d880f 93199->93201 93206 4d8821 __fread_nolock 93200->93206 93202 4d8819 93201->93202 93203 4d8847 93201->93203 93209 4d8894 8 API calls 93202->93209 93205 4f016b 8 API calls 93203->93205 93207 4d8851 93205->93207 93206->93188 93208 4f019b 8 API calls 93207->93208 93208->93206 93209->93206 93210->92522 93211->92525 93212->92529 93213->92283 93214->92285 93215->92289 93216 4ff08e 93217 4ff09a CallCatchBlock 93216->93217 93218 4ff0bb 93217->93218 93219 4ff0a6 93217->93219 93229 4f951d EnterCriticalSection 93218->93229 93235 4ff669 20 API calls _abort 93219->93235 93222 4ff0ab 93236 502b7c 26 API calls _strftime 93222->93236 93223 4ff0c7 93230 4ff0fb 93223->93230 93228 4ff0b6 __wsopen_s 93229->93223 93238 4ff126 93230->93238 93232 4ff108 93233 4ff0d4 93232->93233 93258 4ff669 20 API calls _abort 93232->93258 93237 4ff0f1 LeaveCriticalSection __fread_nolock 93233->93237 93235->93222 93236->93228 93237->93228 93239 4ff14e 93238->93239 93240 4ff134 93238->93240 93259 4fdce5 93239->93259 93269 4ff669 20 API calls _abort 93240->93269 93243 4ff157 93266 509799 93243->93266 93244 4ff139 93270 502b7c 26 API calls _strftime 93244->93270 93246 4ff144 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 93246->93232 93249 4ff1df 93251 4ff20e 93249->93251 93254 4ff1fc 93249->93254 93250 4ff25b 93250->93251 93252 4ff268 93250->93252 93251->93246 93273 4ff2bb 30 API calls 2 library calls 93251->93273 93272 4ff669 20 API calls _abort 93252->93272 93271 4ff43f 31 API calls 4 library calls 93254->93271 93256 4ff206 93256->93246 93258->93233 93260 4fdd06 93259->93260 93261 4fdcf1 93259->93261 93260->93243 93274 4ff669 20 API calls _abort 93261->93274 93263 4fdcf6 93275 502b7c 26 API calls _strftime 93263->93275 93265 4fdd01 93265->93243 93276 509616 93266->93276 93268 4ff173 93268->93246 93268->93249 93268->93250 93269->93244 93270->93246 93271->93256 93272->93246 93273->93246 93274->93263 93275->93265 93277 509622 CallCatchBlock 93276->93277 93278 509642 93277->93278 93279 50962a 93277->93279 93281 5096f6 93278->93281 93286 50967a 93278->93286 93311 4ff656 20 API calls _abort 93279->93311 93316 4ff656 20 API calls _abort 93281->93316 93282 50962f 93312 4ff669 20 API calls _abort 93282->93312 93285 5096fb 93317 4ff669 20 API calls _abort 93285->93317 93301 5054d7 EnterCriticalSection 93286->93301 93287 509637 __wsopen_s 93287->93268 93290 509703 93318 502b7c 26 API calls _strftime 93290->93318 93291 509680 93293 5096a4 93291->93293 93294 5096b9 93291->93294 93313 4ff669 20 API calls _abort 93293->93313 93302 50971b 93294->93302 93297 5096a9 93314 4ff656 20 API calls _abort 93297->93314 93298 5096b4 93315 5096ee LeaveCriticalSection __wsopen_s 93298->93315 93301->93291 93319 505754 93302->93319 93304 50972d 93305 509735 93304->93305 93306 509746 SetFilePointerEx 93304->93306 93332 4ff669 20 API calls _abort 93305->93332 93308 50973a 93306->93308 93309 50975e GetLastError 93306->93309 93308->93298 93333 4ff633 20 API calls 2 library calls 93309->93333 93311->93282 93312->93287 93313->93297 93314->93298 93315->93287 93316->93285 93317->93290 93318->93287 93320 505761 93319->93320 93321 505776 93319->93321 93334 4ff656 20 API calls _abort 93320->93334 93326 50579b 93321->93326 93336 4ff656 20 API calls _abort 93321->93336 93323 505766 93335 4ff669 20 API calls _abort 93323->93335 93326->93304 93327 5057a6 93337 4ff669 20 API calls _abort 93327->93337 93328 50576e 93328->93304 93330 5057ae 93338 502b7c 26 API calls _strftime 93330->93338 93332->93308 93333->93308 93334->93323 93335->93328 93336->93327 93337->93330 93338->93328 93339 4df48c 93342 4dca50 93339->93342 93343 4dca6b 93342->93343 93344 521461 93343->93344 93345 5214af 93343->93345 93357 4dca90 93343->93357 93348 52146b 93344->93348 93351 521478 93344->93351 93344->93357 93387 5561ff 230 API calls 2 library calls 93345->93387 93385 556690 230 API calls 93348->93385 93369 4dcd60 93351->93369 93386 556b2d 230 API calls 2 library calls 93351->93386 93354 521742 93354->93354 93356 4ee781 39 API calls 93356->93357 93357->93356 93360 4dcd8e 93357->93360 93361 52168b 93357->93361 93365 4db3fe 8 API calls 93357->93365 93368 4dcf30 39 API calls 93357->93368 93357->93369 93370 4e02f0 230 API calls 93357->93370 93371 4dbe6d 8 API calls 93357->93371 93373 4dbdc1 93357->93373 93377 4ee73b 39 API calls 93357->93377 93378 4eaa19 230 API calls 93357->93378 93379 4f05d2 5 API calls __Init_thread_wait 93357->93379 93380 4ebbd2 8 API calls 93357->93380 93381 4f0433 29 API calls __onexit 93357->93381 93382 4f0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 93357->93382 93383 4ef4ed 81 API calls 93357->93383 93384 4ef354 230 API calls 93357->93384 93388 52ff4f 8 API calls 93357->93388 93389 556569 81 API calls 93361->93389 93365->93357 93368->93357 93369->93360 93390 543ef6 81 API calls __wsopen_s 93369->93390 93370->93357 93371->93357 93374 4dbdcc 93373->93374 93375 4dbdfb 93374->93375 93391 4dbf39 39 API calls 93374->93391 93375->93357 93377->93357 93378->93357 93379->93357 93380->93357 93381->93357 93382->93357 93383->93357 93384->93357 93385->93351 93386->93369 93387->93357 93388->93357 93389->93369 93390->93354 93391->93375 93392 4e15af 93399 4ee34f 93392->93399 93394 4e15c5 93408 4ee3b3 93394->93408 93396 4e15ef 93397 5261ab 93396->93397 93420 543ef6 81 API calls __wsopen_s 93396->93420 93400 4ee35d 93399->93400 93401 4ee370 93399->93401 93404 4db3fe 8 API calls 93400->93404 93402 4ee375 93401->93402 93403 4ee3a3 93401->93403 93405 4f016b 8 API calls 93402->93405 93406 4db3fe 8 API calls 93403->93406 93407 4ee367 93404->93407 93405->93407 93406->93407 93407->93394 93409 4d7a14 8 API calls 93408->93409 93410 4ee3ea 93409->93410 93411 4db25f 8 API calls 93410->93411 93413 4ee41b 93410->93413 93412 52e4e4 93411->93412 93414 4d7af4 8 API calls 93412->93414 93413->93396 93415 52e4ef 93414->93415 93421 4ee73b 39 API calls 93415->93421 93417 52e502 93418 4db3fe 8 API calls 93417->93418 93419 52e506 93417->93419 93418->93419 93419->93419 93420->93397 93421->93417 93422 4e230c 93423 4e2315 __fread_nolock 93422->93423 93424 4d8e70 52 API calls 93423->93424 93425 527487 93423->93425 93428 4e2366 93423->93428 93429 4f016b 8 API calls 93423->93429 93432 4e1fa7 __fread_nolock 93423->93432 93433 4f019b 8 API calls 93423->93433 93424->93423 93434 4d662b 8 API calls __fread_nolock 93425->93434 93427 527493 93431 4dbe6d 8 API calls 93427->93431 93427->93432 93430 4d7cb3 8 API calls 93428->93430 93429->93423 93430->93432 93431->93432 93433->93423 93434->93427 93435 508792 93440 50854e 93435->93440 93438 5087ba 93445 50857f try_get_first_available_module 93440->93445 93442 50877e 93464 502b7c 26 API calls _strftime 93442->93464 93444 5086d3 93444->93438 93452 510d24 93444->93452 93451 5086c8 93445->93451 93455 4f919b 93445->93455 93448 4f919b 40 API calls 93449 50873b 93448->93449 93450 4f919b 40 API calls 93449->93450 93449->93451 93450->93451 93451->93444 93463 4ff669 20 API calls _abort 93451->93463 93468 510421 93452->93468 93454 510d3f 93454->93438 93456 4f923b 93455->93456 93457 4f91af 93455->93457 93467 4f9253 40 API calls 3 library calls 93456->93467 93462 4f91d1 93457->93462 93465 4ff669 20 API calls _abort 93457->93465 93460 4f91c6 93466 502b7c 26 API calls _strftime 93460->93466 93462->93448 93462->93451 93463->93442 93464->93444 93465->93460 93466->93462 93467->93462 93471 51042d CallCatchBlock 93468->93471 93469 51043b 93526 4ff669 20 API calls _abort 93469->93526 93471->93469 93473 510474 93471->93473 93472 510440 93527 502b7c 26 API calls _strftime 93472->93527 93479 5109fb 93473->93479 93477 51044a __wsopen_s 93477->93454 93529 5107cf 93479->93529 93482 510a46 93547 5055b1 93482->93547 93483 510a2d 93561 4ff656 20 API calls _abort 93483->93561 93486 510a4b 93487 510a54 93486->93487 93488 510a6b 93486->93488 93563 4ff656 20 API calls _abort 93487->93563 93560 51073a CreateFileW 93488->93560 93492 510a59 93564 4ff669 20 API calls _abort 93492->93564 93493 510b21 GetFileType 93499 510b73 93493->93499 93500 510b2c GetLastError 93493->93500 93494 510aa4 93494->93493 93498 510af6 GetLastError 93494->93498 93565 51073a CreateFileW 93494->93565 93495 510498 93528 5104c1 LeaveCriticalSection __wsopen_s 93495->93528 93497 510a32 93562 4ff669 20 API calls _abort 93497->93562 93566 4ff633 20 API calls 2 library calls 93498->93566 93569 5054fa 21 API calls 3 library calls 93499->93569 93567 4ff633 20 API calls 2 library calls 93500->93567 93504 510b3a CloseHandle 93504->93497 93505 510b63 93504->93505 93568 4ff669 20 API calls _abort 93505->93568 93507 510ae9 93507->93493 93507->93498 93509 510b94 93511 510be0 93509->93511 93570 51094b 72 API calls 4 library calls 93509->93570 93510 510b68 93510->93497 93515 510c0d 93511->93515 93571 5104ed 72 API calls 3 library calls 93511->93571 93514 510c06 93514->93515 93516 510c1e 93514->93516 93572 508a3e 93515->93572 93516->93495 93518 510c9c CloseHandle 93516->93518 93587 51073a CreateFileW 93518->93587 93520 510cc7 93521 510cd1 GetLastError 93520->93521 93522 510cfd 93520->93522 93588 4ff633 20 API calls 2 library calls 93521->93588 93522->93495 93524 510cdd 93589 5056c3 21 API calls 3 library calls 93524->93589 93526->93472 93527->93477 93528->93477 93530 5107f0 93529->93530 93531 51080a 93529->93531 93530->93531 93597 4ff669 20 API calls _abort 93530->93597 93590 51075f 93531->93590 93534 5107ff 93598 502b7c 26 API calls _strftime 93534->93598 93536 510842 93537 510871 93536->93537 93599 4ff669 20 API calls _abort 93536->93599 93544 5108c4 93537->93544 93601 4fda9d 26 API calls 2 library calls 93537->93601 93540 5108bf 93542 51093e 93540->93542 93540->93544 93541 510866 93600 502b7c 26 API calls _strftime 93541->93600 93602 502b8c 11 API calls _abort 93542->93602 93544->93482 93544->93483 93546 51094a 93548 5055bd CallCatchBlock 93547->93548 93605 5032ee EnterCriticalSection 93548->93605 93550 50560b 93606 5056ba 93550->93606 93552 5055e9 93609 505390 93552->93609 93553 5055c4 93553->93550 93553->93552 93557 505657 EnterCriticalSection 93553->93557 93554 505634 __wsopen_s 93554->93486 93557->93550 93559 505664 LeaveCriticalSection 93557->93559 93559->93553 93560->93494 93561->93497 93562->93495 93563->93492 93564->93497 93565->93507 93566->93497 93567->93504 93568->93510 93569->93509 93570->93511 93571->93514 93573 505754 __wsopen_s 26 API calls 93572->93573 93575 508a4e 93573->93575 93574 508a54 93635 5056c3 21 API calls 3 library calls 93574->93635 93575->93574 93576 508a86 93575->93576 93578 505754 __wsopen_s 26 API calls 93575->93578 93576->93574 93579 505754 __wsopen_s 26 API calls 93576->93579 93582 508a7d 93578->93582 93583 508a92 CloseHandle 93579->93583 93580 508aac 93581 508ace 93580->93581 93636 4ff633 20 API calls 2 library calls 93580->93636 93581->93495 93585 505754 __wsopen_s 26 API calls 93582->93585 93583->93574 93586 508a9e GetLastError 93583->93586 93585->93576 93586->93574 93587->93520 93588->93524 93589->93522 93591 510777 93590->93591 93594 510792 93591->93594 93603 4ff669 20 API calls _abort 93591->93603 93593 5107b6 93604 502b7c 26 API calls _strftime 93593->93604 93594->93536 93596 5107c1 93596->93536 93597->93534 93598->93531 93599->93541 93600->93537 93601->93540 93602->93546 93603->93593 93604->93596 93605->93553 93617 503336 LeaveCriticalSection 93606->93617 93608 5056c1 93608->93554 93618 50500d 93609->93618 93611 5053af 93626 502d58 93611->93626 93612 5053a2 93612->93611 93625 503795 11 API calls 2 library calls 93612->93625 93615 505401 93615->93550 93616 5054d7 EnterCriticalSection 93615->93616 93616->93550 93617->93608 93623 50501a pre_c_initialization 93618->93623 93619 50505a 93633 4ff669 20 API calls _abort 93619->93633 93620 505045 RtlAllocateHeap 93621 505058 93620->93621 93620->93623 93621->93612 93623->93619 93623->93620 93632 4f523d 7 API calls 2 library calls 93623->93632 93625->93612 93627 502d8c _free 93626->93627 93628 502d63 RtlFreeHeap 93626->93628 93627->93615 93628->93627 93629 502d78 93628->93629 93634 4ff669 20 API calls _abort 93629->93634 93631 502d7e GetLastError 93631->93627 93632->93623 93633->93621 93634->93631 93635->93580 93636->93581 93637 4f078b 93638 4f0797 CallCatchBlock 93637->93638 93667 4f0241 93638->93667 93640 4f079e 93641 4f08f1 93640->93641 93644 4f07c8 93640->93644 93708 4f0bcf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 93641->93708 93643 4f08f8 93701 4f51e2 93643->93701 93651 4f0807 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 93644->93651 93678 50280d 93644->93678 93654 4f0868 93651->93654 93704 4f51aa 38 API calls 3 library calls 93651->93704 93652 4f07e7 93686 4f0ce9 93654->93686 93656 4f086e 93690 4d32a2 93656->93690 93661 4f088a 93661->93643 93662 4f088e 93661->93662 93663 4f0897 93662->93663 93706 4f5185 28 API calls _abort 93662->93706 93707 4f03d0 13 API calls 2 library calls 93663->93707 93666 4f089f 93666->93652 93668 4f024a 93667->93668 93710 4f0a28 IsProcessorFeaturePresent 93668->93710 93670 4f0256 93711 4f3024 10 API calls 3 library calls 93670->93711 93672 4f025b 93677 4f025f 93672->93677 93712 5026a7 93672->93712 93675 4f0276 93675->93640 93677->93640 93679 502824 93678->93679 93680 4f0e1c CatchGuardHandler 5 API calls 93679->93680 93681 4f07e1 93680->93681 93681->93652 93682 5027b1 93681->93682 93683 5027e0 93682->93683 93684 4f0e1c CatchGuardHandler 5 API calls 93683->93684 93685 502809 93684->93685 93685->93651 93763 4f26d0 93686->93763 93689 4f0d0f 93689->93656 93691 4d3309 93690->93691 93692 4d32ae IsThemeActive 93690->93692 93705 4f0d22 GetModuleHandleW 93691->93705 93765 4f52d3 93692->93765 93694 4d32d9 93771 4f5339 93694->93771 93696 4d32e0 93778 4d326d SystemParametersInfoW SystemParametersInfoW 93696->93778 93698 4d32e7 93779 4d3312 93698->93779 93700 4d32ef SystemParametersInfoW 93700->93691 94670 4f4f5f 93701->94670 93704->93654 93705->93661 93706->93663 93707->93666 93708->93643 93710->93670 93711->93672 93716 50d596 93712->93716 93715 4f304d 8 API calls 3 library calls 93715->93677 93717 50d5b3 93716->93717 93720 50d5af 93716->93720 93717->93720 93722 504f8b 93717->93722 93719 4f0268 93719->93675 93719->93715 93734 4f0e1c 93720->93734 93723 504f97 CallCatchBlock 93722->93723 93741 5032ee EnterCriticalSection 93723->93741 93725 504f9e 93742 50543f 93725->93742 93727 504fad 93733 504fbc 93727->93733 93755 504e1f 29 API calls 93727->93755 93730 504fcd __wsopen_s 93730->93717 93731 504fb7 93756 504ed5 GetStdHandle GetFileType 93731->93756 93757 504fd8 LeaveCriticalSection _abort 93733->93757 93735 4f0e27 IsProcessorFeaturePresent 93734->93735 93736 4f0e25 93734->93736 93738 4f0fee 93735->93738 93736->93719 93762 4f0fb1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 93738->93762 93740 4f10d1 93740->93719 93741->93725 93743 50544b CallCatchBlock 93742->93743 93744 505458 93743->93744 93745 50546f 93743->93745 93759 4ff669 20 API calls _abort 93744->93759 93758 5032ee EnterCriticalSection 93745->93758 93748 50545d 93760 502b7c 26 API calls _strftime 93748->93760 93750 505467 __wsopen_s 93750->93727 93751 5054a7 93761 5054ce LeaveCriticalSection _abort 93751->93761 93753 50547b 93753->93751 93754 505390 __wsopen_s 21 API calls 93753->93754 93754->93753 93755->93731 93756->93733 93757->93730 93758->93753 93759->93748 93760->93750 93761->93750 93762->93740 93764 4f0cfc GetStartupInfoW 93763->93764 93764->93689 93766 4f52df CallCatchBlock 93765->93766 93828 5032ee EnterCriticalSection 93766->93828 93768 4f52ea pre_c_initialization 93829 4f532a 93768->93829 93770 4f531f __wsopen_s 93770->93694 93772 4f535f 93771->93772 93773 4f5345 93771->93773 93772->93696 93773->93772 93833 4ff669 20 API calls _abort 93773->93833 93775 4f534f 93834 502b7c 26 API calls _strftime 93775->93834 93777 4f535a 93777->93696 93778->93698 93780 4d3322 __wsopen_s 93779->93780 93781 4dbf07 8 API calls 93780->93781 93782 4d332e GetCurrentDirectoryW 93781->93782 93835 4d4f60 93782->93835 93784 4d3355 IsDebuggerPresent 93785 513c7d MessageBoxA 93784->93785 93786 4d3363 93784->93786 93787 513c95 93785->93787 93786->93787 93788 4d3377 93786->93788 93941 4d40e0 93787->93941 93903 4d3a1c 93788->93903 93795 4d33e9 93797 513cc6 SetCurrentDirectoryW 93795->93797 93799 4d33f1 93795->93799 93797->93799 93798 4d33fc 93935 4d345a 7 API calls 93798->93935 93799->93798 93949 531ef3 AllocateAndInitializeSid CheckTokenMembership FreeSid 93799->93949 93802 513ce1 93802->93798 93805 513cf3 93802->93805 93950 4d551b 93805->93950 93806 4d3406 93812 4d341b 93806->93812 93939 4d38f2 60 API calls ___scrt_fastfail 93806->93939 93808 513cfc 93810 4db25f 8 API calls 93808->93810 93811 513d0a 93810->93811 93814 513d12 93811->93814 93815 513d39 93811->93815 93813 4d3436 93812->93813 93940 4d388e Shell_NotifyIconW ___scrt_fastfail 93812->93940 93818 4d343d SetCurrentDirectoryW 93813->93818 93957 4d65a4 93814->93957 93817 4d65a4 8 API calls 93815->93817 93820 513d35 GetForegroundWindow ShellExecuteW 93817->93820 93821 4d3451 93818->93821 93825 513d6a 93820->93825 93821->93700 93824 4d7af4 8 API calls 93826 513d2b 93824->93826 93825->93813 93827 4d65a4 8 API calls 93826->93827 93827->93820 93828->93768 93832 503336 LeaveCriticalSection 93829->93832 93831 4f5331 93831->93770 93832->93831 93833->93775 93834->93777 93836 4dbf07 8 API calls 93835->93836 93837 4d4f76 93836->93837 93966 4d60f5 93837->93966 93839 4d4f94 93840 4dbceb 8 API calls 93839->93840 93841 4d4fa8 93840->93841 93842 4dbe6d 8 API calls 93841->93842 93843 4d4fb3 93842->93843 93980 4d88e8 93843->93980 93846 4db25f 8 API calls 93847 4d4fcc 93846->93847 93848 4dbdc1 39 API calls 93847->93848 93849 4d4fdc 93848->93849 93850 4db25f 8 API calls 93849->93850 93851 4d5002 93850->93851 93852 4dbdc1 39 API calls 93851->93852 93853 4d5011 93852->93853 93854 4dbf07 8 API calls 93853->93854 93855 4d502f 93854->93855 93983 4d5151 93855->93983 93858 4f4db8 40 API calls 93859 4d5049 93858->93859 93860 514afd 93859->93860 93861 4d5053 93859->93861 93863 4d5151 8 API calls 93860->93863 93862 4f4db8 40 API calls 93861->93862 93865 4d505e 93862->93865 93864 514b11 93863->93864 93867 4d5151 8 API calls 93864->93867 93865->93864 93866 4d5068 93865->93866 93868 4f4db8 40 API calls 93866->93868 93869 514b2d 93867->93869 93870 4d5073 93868->93870 93872 4d551b 10 API calls 93869->93872 93870->93869 93871 4d507d 93870->93871 93873 4f4db8 40 API calls 93871->93873 93874 514b50 93872->93874 93875 4d5088 93873->93875 93876 4d5151 8 API calls 93874->93876 93877 514b79 93875->93877 93878 4d5092 93875->93878 93881 514b5c 93876->93881 93880 4d5151 8 API calls 93877->93880 93879 4d50b5 93878->93879 93882 4dbe6d 8 API calls 93878->93882 93884 514bb4 93879->93884 93888 4d7d51 8 API calls 93879->93888 93883 514b97 93880->93883 93885 4dbe6d 8 API calls 93881->93885 93886 4d50a8 93882->93886 93887 4dbe6d 8 API calls 93883->93887 93889 514b6a 93885->93889 93890 4d5151 8 API calls 93886->93890 93891 514ba5 93887->93891 93892 4d50c5 93888->93892 93893 4d5151 8 API calls 93889->93893 93890->93879 93894 4d5151 8 API calls 93891->93894 93895 4d83b0 8 API calls 93892->93895 93893->93877 93894->93884 93896 4d50d3 93895->93896 93989 4d8a10 93896->93989 93898 4d88e8 8 API calls 93900 4d50ee 93898->93900 93899 4d8a10 8 API calls 93899->93900 93900->93898 93900->93899 93901 4d5132 93900->93901 93902 4d5151 8 API calls 93900->93902 93901->93784 93902->93900 93904 4d3a29 __wsopen_s 93903->93904 93905 5140b4 ___scrt_fastfail 93904->93905 93906 4d3a42 93904->93906 93909 5140d0 GetOpenFileNameW 93905->93909 93907 4d557e 9 API calls 93906->93907 93908 4d3a4b 93907->93908 94007 4d39de 93908->94007 93911 51411f 93909->93911 93913 4d84b7 8 API calls 93911->93913 93915 514134 93913->93915 93915->93915 93916 4d3a60 94025 4d6085 93916->94025 94659 4d35ab 7 API calls 93935->94659 93937 4d3401 93938 4d353a CreateWindowExW CreateWindowExW ShowWindow ShowWindow 93937->93938 93938->93806 93939->93812 93940->93813 93942 4d40ee 93941->93942 93943 4d4145 93941->93943 93944 4d40ff 93942->93944 93946 4f016b 8 API calls 93942->93946 93945 4f016b 8 API calls 93943->93945 93947 4d4154 8 API calls 93944->93947 93945->93944 93946->93944 93948 4d4116 93947->93948 93948->93795 93949->93802 93951 5122f0 __wsopen_s 93950->93951 93952 4d5528 GetModuleFileNameW 93951->93952 93953 4db25f 8 API calls 93952->93953 93954 4d554e 93953->93954 93955 4d557e 9 API calls 93954->93955 93956 4d5558 93955->93956 93956->93808 93958 4d65bb 93957->93958 93959 515629 93957->93959 94660 4d65cc 93958->94660 93961 4f016b 8 API calls 93959->93961 93963 515633 _wcslen 93961->93963 93962 4d65c6 93962->93824 93964 4f019b 8 API calls 93963->93964 93965 51566c __fread_nolock 93964->93965 93967 4d6102 __wsopen_s 93966->93967 93968 4d84b7 8 API calls 93967->93968 93969 4d6134 93967->93969 93968->93969 93970 4d627c 8 API calls 93969->93970 93978 4d616a 93969->93978 93970->93969 93971 4db25f 8 API calls 93972 4d6261 93971->93972 93974 4d684e 8 API calls 93972->93974 93973 4db25f 8 API calls 93973->93978 93975 4d626d 93974->93975 93975->93839 93977 4d6238 93977->93971 93977->93975 93978->93973 93978->93977 93979 4d627c 8 API calls 93978->93979 94000 4d684e 93978->94000 93979->93978 93981 4f016b 8 API calls 93980->93981 93982 4d4fbf 93981->93982 93982->93846 93984 4d5179 93983->93984 93985 4d515b 93983->93985 93986 4d84b7 8 API calls 93984->93986 93987 4d503b 93985->93987 93988 4dbe6d 8 API calls 93985->93988 93986->93987 93987->93858 93988->93987 93990 4d8a26 93989->93990 93991 516728 93990->93991 93996 4d8a30 93990->93996 94006 4eb71c 8 API calls 93991->94006 93992 516735 93994 4db3fe 8 API calls 93992->93994 93995 516753 93994->93995 93995->93995 93996->93992 93997 4d8b44 93996->93997 93999 4d8b4b 93996->93999 93998 4f016b 8 API calls 93997->93998 93998->93999 93999->93900 94001 4d685d 94000->94001 94005 4d687e __fread_nolock 94000->94005 94003 4f019b 8 API calls 94001->94003 94002 4f016b 8 API calls 94004 4d6891 94002->94004 94003->94005 94004->93978 94005->94002 94006->93992 94008 5122f0 __wsopen_s 94007->94008 94009 4d39eb GetLongPathNameW 94008->94009 94010 4d84b7 8 API calls 94009->94010 94011 4d3a13 94010->94011 94012 4d5379 94011->94012 94013 4dbf07 8 API calls 94012->94013 94014 4d538b 94013->94014 94015 4d557e 9 API calls 94014->94015 94016 4d5396 94015->94016 94017 514d35 94016->94017 94018 4d53a1 94016->94018 94022 514d57 94017->94022 94060 4ee2e5 41 API calls 94017->94060 94019 4d684e 8 API calls 94018->94019 94021 4d53ad 94019->94021 94054 4d1340 94021->94054 94024 4d53c0 94024->93916 94061 4d636d 94025->94061 94055 4d1352 94054->94055 94059 4d1371 __fread_nolock 94054->94059 94058 4f019b 8 API calls 94055->94058 94056 4f016b 8 API calls 94057 4d1388 94056->94057 94057->94024 94058->94059 94059->94056 94060->94017 94205 4d6332 LoadLibraryA 94061->94205 94066 5154b4 94069 4d63db 68 API calls 94066->94069 94067 4d6398 LoadLibraryExW 94213 4d62fb LoadLibraryA 94067->94213 94070 5154bb 94069->94070 94072 4d62fb 3 API calls 94070->94072 94076 5154c3 94072->94076 94234 4d653a 94076->94234 94206 4d6368 94205->94206 94207 4d634a GetProcAddress 94205->94207 94210 4fe97b 94206->94210 94208 4d635a 94207->94208 94208->94206 94209 4d6361 FreeLibrary 94208->94209 94209->94206 94240 4fe8ba 94210->94240 94212 4d638c 94212->94066 94212->94067 94214 4d632f 94213->94214 94215 4d6310 GetProcAddress 94213->94215 94218 4d6410 94214->94218 94216 4d6320 94215->94216 94216->94214 94217 4d6328 FreeLibrary 94216->94217 94217->94214 94219 4f019b 8 API calls 94218->94219 94220 4d6425 94219->94220 94221 4d41a6 8 API calls 94220->94221 94223 4d6431 __fread_nolock 94221->94223 94222 51552e 94298 5439a7 74 API calls 94222->94298 94223->94222 94227 4d646c 94223->94227 94297 543923 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 94223->94297 94226 4d653a 40 API calls 94226->94227 94227->94226 94229 4d6500 ISource 94227->94229 94230 515572 94227->94230 94292 4d6564 94227->94292 94235 4d654c 94234->94235 94236 5155cc 94234->94236 94330 4fec54 94235->94330 94243 4fe8c6 CallCatchBlock 94240->94243 94241 4fe8d4 94265 4ff669 20 API calls _abort 94241->94265 94243->94241 94245 4fe904 94243->94245 94244 4fe8d9 94266 502b7c 26 API calls _strftime 94244->94266 94247 4fe909 94245->94247 94248 4fe916 94245->94248 94267 4ff669 20 API calls _abort 94247->94267 94257 5083f1 94248->94257 94251 4fe91f 94252 4fe925 94251->94252 94253 4fe932 94251->94253 94255 4fe8e4 __wsopen_s 94255->94212 94258 5083fd CallCatchBlock 94257->94258 94270 5032ee EnterCriticalSection 94258->94270 94260 50840b 94271 50848b 94260->94271 94264 50843c __wsopen_s 94264->94251 94265->94244 94266->94255 94267->94255 94270->94260 94272 5084ae 94271->94272 94273 508507 94272->94273 94280 508418 94272->94280 94287 4f951d EnterCriticalSection 94272->94287 94288 4f9531 LeaveCriticalSection 94272->94288 94274 50500d pre_c_initialization 20 API calls 94273->94274 94275 508510 94274->94275 94277 502d58 _free 20 API calls 94275->94277 94278 508519 94277->94278 94278->94280 94289 503795 11 API calls 2 library calls 94278->94289 94284 508447 94280->94284 94281 508538 94291 503336 LeaveCriticalSection 94284->94291 94286 50844e 94286->94264 94287->94272 94288->94272 94289->94281 94291->94286 94297->94222 94298->94227 94333 4fec71 94330->94333 94334 4fec7d CallCatchBlock 94333->94334 94659->93937 94661 4d65dc _wcslen 94660->94661 94662 4d65ef 94661->94662 94663 51568b 94661->94663 94664 4d7cb3 8 API calls 94662->94664 94665 4f016b 8 API calls 94663->94665 94666 4d65fc __fread_nolock 94664->94666 94667 515695 94665->94667 94666->93962 94668 4f019b 8 API calls 94667->94668 94669 5156c5 __fread_nolock 94668->94669 94671 4f4f6b BuildCatchObjectHelperInternal 94670->94671 94672 4f4f84 94671->94672 94673 4f4f72 94671->94673 94694 5032ee EnterCriticalSection 94672->94694 94709 4f50b9 GetModuleHandleW 94673->94709 94676 4f4f77 94676->94672 94710 4f50fd GetModuleHandleExW 94676->94710 94677 4f5029 94698 4f5069 94677->94698 94681 4f4f8b 94681->94677 94683 4f5000 94681->94683 94695 502538 94681->94695 94684 4f5018 94683->94684 94688 5027b1 _abort 5 API calls 94683->94688 94689 5027b1 _abort 5 API calls 94684->94689 94685 4f5046 94701 4f5078 94685->94701 94686 4f5072 94718 5120c9 5 API calls CatchGuardHandler 94686->94718 94688->94684 94689->94677 94694->94681 94719 502271 94695->94719 94738 503336 LeaveCriticalSection 94698->94738 94700 4f5042 94700->94685 94700->94686 94739 50399c 94701->94739 94704 4f50a6 94706 4f50fd _abort 8 API calls 94704->94706 94705 4f5086 GetPEB 94705->94704 94707 4f5096 GetCurrentProcess TerminateProcess 94705->94707 94708 4f50ae ExitProcess 94706->94708 94707->94704 94709->94676 94711 4f514a 94710->94711 94712 4f5127 GetProcAddress 94710->94712 94714 4f5159 94711->94714 94715 4f5150 FreeLibrary 94711->94715 94713 4f513c 94712->94713 94713->94711 94716 4f0e1c CatchGuardHandler 5 API calls 94714->94716 94715->94714 94717 4f4f83 94716->94717 94717->94672 94722 502220 94719->94722 94721 502295 94721->94683 94723 50222c CallCatchBlock 94722->94723 94730 5032ee EnterCriticalSection 94723->94730 94725 50223a 94731 5022c1 94725->94731 94729 502258 __wsopen_s 94729->94721 94730->94725 94732 5022e1 94731->94732 94735 5022e9 94731->94735 94733 4f0e1c CatchGuardHandler 5 API calls 94732->94733 94734 502247 94733->94734 94737 502265 LeaveCriticalSection _abort 94734->94737 94735->94732 94736 502d58 _free 20 API calls 94735->94736 94736->94732 94737->94729 94738->94700 94740 5039c1 94739->94740 94741 5039b7 94739->94741 94746 503367 5 API calls 2 library calls 94740->94746 94743 4f0e1c CatchGuardHandler 5 API calls 94741->94743 94744 4f5082 94743->94744 94744->94704 94744->94705 94745 5039d8 94745->94741 94746->94745 94747 5255f4 94748 4ee34f 8 API calls 94747->94748 94749 52560a 94748->94749 94751 525685 94749->94751 94756 4ea9e5 9 API calls 94749->94756 94753 52617b 94751->94753 94758 543ef6 81 API calls __wsopen_s 94751->94758 94754 525665 94754->94751 94757 542393 8 API calls 94754->94757 94756->94754 94757->94751 94758->94753 94759 4d1044 94764 4d2735 94759->94764 94761 4d104a 94800 4f0433 29 API calls __onexit 94761->94800 94763 4d1054 94801 4d29da 94764->94801 94768 4d27ac 94769 4dbf07 8 API calls 94768->94769 94770 4d27b6 94769->94770 94771 4dbf07 8 API calls 94770->94771 94772 4d27c0 94771->94772 94773 4dbf07 8 API calls 94772->94773 94774 4d27ca 94773->94774 94775 4dbf07 8 API calls 94774->94775 94776 4d2808 94775->94776 94777 4dbf07 8 API calls 94776->94777 94778 4d28d4 94777->94778 94811 4d2d5e 94778->94811 94782 4d2906 94783 4dbf07 8 API calls 94782->94783 94784 4d2910 94783->94784 94785 4e30e0 9 API calls 94784->94785 94786 4d293b 94785->94786 94832 4d30ed 94786->94832 94788 4d2957 94789 4d2967 GetStdHandle 94788->94789 94790 5139c1 94789->94790 94791 4d29bc 94789->94791 94790->94791 94792 5139ca 94790->94792 94794 4d29c9 OleInitialize 94791->94794 94793 4f016b 8 API calls 94792->94793 94795 5139d1 94793->94795 94794->94761 94839 5409d9 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 94795->94839 94797 5139da 94840 541200 CreateThread 94797->94840 94799 5139e6 CloseHandle 94799->94791 94800->94763 94841 4d2a33 94801->94841 94804 4d2a33 8 API calls 94805 4d2a12 94804->94805 94806 4dbf07 8 API calls 94805->94806 94807 4d2a1e 94806->94807 94808 4d84b7 8 API calls 94807->94808 94809 4d276b 94808->94809 94810 4d3205 6 API calls 94809->94810 94810->94768 94812 4dbf07 8 API calls 94811->94812 94813 4d2d6e 94812->94813 94814 4dbf07 8 API calls 94813->94814 94815 4d2d76 94814->94815 94816 4dbf07 8 API calls 94815->94816 94817 4d2d91 94816->94817 94818 4f016b 8 API calls 94817->94818 94819 4d28de 94818->94819 94820 4d318c 94819->94820 94821 4d319a 94820->94821 94822 4dbf07 8 API calls 94821->94822 94823 4d31a5 94822->94823 94824 4dbf07 8 API calls 94823->94824 94825 4d31b0 94824->94825 94826 4dbf07 8 API calls 94825->94826 94827 4d31bb 94826->94827 94828 4dbf07 8 API calls 94827->94828 94829 4d31c6 94828->94829 94830 4f016b 8 API calls 94829->94830 94831 4d31d8 RegisterWindowMessageW 94830->94831 94831->94782 94833 4d30fd 94832->94833 94834 513c69 94832->94834 94836 4f016b 8 API calls 94833->94836 94848 543b63 8 API calls 94834->94848 94838 4d3105 94836->94838 94837 513c74 94838->94788 94839->94797 94840->94799 94849 5411e6 14 API calls 94840->94849 94842 4dbf07 8 API calls 94841->94842 94843 4d2a3e 94842->94843 94844 4dbf07 8 API calls 94843->94844 94845 4d2a46 94844->94845 94846 4dbf07 8 API calls 94845->94846 94847 4d2a08 94846->94847 94847->94804 94848->94837 94850 52e5f8 GetUserNameW 94851 52e610 94850->94851 94852 52e71e 94853 52e737 GetProcAddress 94852->94853 94854 52e747 94852->94854 94853->94854 94855 52e762 FreeLibrary 94854->94855 94856 52e610 94854->94856 94855->94856 94857 52e6dd 94858 52e68a 94857->94858 94860 53e753 SHGetFolderPathW 94858->94860 94861 4d84b7 8 API calls 94860->94861 94862 53e780 94861->94862 94862->94858 94863 4d367c 94866 4d3696 94863->94866 94867 4d36ad 94866->94867 94868 4d3711 94867->94868 94869 4d36b2 94867->94869 94906 4d370f 94867->94906 94873 4d3717 94868->94873 94874 513dce 94868->94874 94870 4d36bf 94869->94870 94871 4d378b PostQuitMessage 94869->94871 94875 4d36ca 94870->94875 94876 513e3b 94870->94876 94900 4d3690 94871->94900 94872 4d36f6 DefWindowProcW 94872->94900 94878 4d371e 94873->94878 94879 4d3743 SetTimer RegisterWindowMessageW 94873->94879 94922 4d2f24 10 API calls 94874->94922 94882 4d3795 94875->94882 94883 4d36d4 94875->94883 94927 53c80c 65 API calls ___scrt_fastfail 94876->94927 94880 4d3727 KillTimer 94878->94880 94881 513d6f 94878->94881 94884 4d376c CreatePopupMenu 94879->94884 94879->94900 94918 4d388e Shell_NotifyIconW ___scrt_fastfail 94880->94918 94893 513d74 94881->94893 94894 513daa MoveWindow 94881->94894 94911 4efcbb 94882->94911 94888 513e20 94883->94888 94889 4d36df 94883->94889 94884->94900 94886 513def 94923 4ef1c6 40 API calls 94886->94923 94888->94872 94926 531367 8 API calls 94888->94926 94898 4d3779 94889->94898 94899 4d36ea 94889->94899 94890 513e4d 94890->94872 94890->94900 94895 513d99 SetFocus 94893->94895 94896 513d7a 94893->94896 94894->94900 94895->94900 94896->94899 94901 513d83 94896->94901 94897 4d373a 94919 4d572c DeleteObject DestroyWindow 94897->94919 94920 4d37a6 75 API calls ___scrt_fastfail 94898->94920 94899->94872 94924 4d388e Shell_NotifyIconW ___scrt_fastfail 94899->94924 94921 4d2f24 10 API calls 94901->94921 94906->94872 94907 4d3789 94907->94900 94909 513e14 94925 4d38f2 60 API calls ___scrt_fastfail 94909->94925 94912 4efd59 94911->94912 94913 4efcd3 ___scrt_fastfail 94911->94913 94912->94900 94928 4d5f59 94913->94928 94915 4efd42 KillTimer SetTimer 94915->94912 94916 4efcfa 94916->94915 94917 52fdcb Shell_NotifyIconW 94916->94917 94917->94915 94918->94897 94919->94900 94920->94907 94921->94900 94922->94886 94923->94899 94924->94909 94925->94906 94926->94906 94927->94890 94929 4d6058 94928->94929 94930 4d5f76 94928->94930 94929->94916 94931 4d7a14 8 API calls 94930->94931 94932 4d5f84 94931->94932 94933 515101 LoadStringW 94932->94933 94934 4d5f91 94932->94934 94937 51511b 94933->94937 94935 4d84b7 8 API calls 94934->94935 94936 4d5fa6 94935->94936 94938 4d5fb3 94936->94938 94945 515137 94936->94945 94940 4dbe6d 8 API calls 94937->94940 94944 4d5fd9 ___scrt_fastfail 94937->94944 94938->94937 94939 4d5fbd 94938->94939 94941 4d65a4 8 API calls 94939->94941 94940->94944 94942 4d5fcb 94941->94942 94943 4d7af4 8 API calls 94942->94943 94943->94944 94946 4d603e Shell_NotifyIconW 94944->94946 94945->94944 94947 4dbf07 8 API calls 94945->94947 94955 51517a 94945->94955 94946->94929 94948 515161 94947->94948 94958 53a265 9 API calls 94948->94958 94951 515199 94954 4d65a4 8 API calls 94951->94954 94952 51516c 94953 4d7af4 8 API calls 94952->94953 94953->94955 94956 5151aa 94954->94956 94959 4efe8f 51 API calls 94955->94959 94957 4d65a4 8 API calls 94956->94957 94957->94944 94958->94952 94959->94951 94960 5127a2 94963 4d2a52 94960->94963 94964 5139f4 DestroyWindow 94963->94964 94965 4d2a91 mciSendStringW 94963->94965 94976 513a00 94964->94976 94966 4d2aad 94965->94966 94967 4d2d08 94965->94967 94968 4d2abb 94966->94968 94966->94976 94967->94966 94969 4d2d17 UnregisterHotKey 94967->94969 94995 4d2e70 94968->94995 94969->94967 94971 513a1e FindClose 94971->94976 94973 513a45 94977 513a69 94973->94977 94978 513a58 FreeLibrary 94973->94978 94974 4d7953 CloseHandle 94974->94976 94975 4d2ad0 94975->94977 94983 4d2ade 94975->94983 94976->94971 94976->94973 94976->94974 94979 513a7d VirtualFree 94977->94979 94984 4d2b4b 94977->94984 94978->94973 94979->94977 94980 4d2b3a CoUninitialize 94980->94984 94981 513ac5 94987 513ad4 ISource 94981->94987 95001 543c45 6 API calls ISource 94981->95001 94983->94980 94984->94981 94985 4d2b56 94984->94985 94999 4d2f86 VirtualFreeEx CloseHandle 94985->94999 94990 513b63 94987->94990 95002 536d63 8 API calls ISource 94987->95002 94989 4d2b7c 94989->94987 94991 4d2c61 94989->94991 94991->94990 94992 4d2caf 94991->94992 94992->94990 95000 4d2eb8 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 94992->95000 94994 4d2d03 94997 4d2e7d 94995->94997 94996 4d2ac2 94996->94973 94996->94975 94997->94996 95003 5378b9 8 API calls 94997->95003 94999->94989 95000->94994 95001->94981 95002->94987 95003->94997 95004 4d1098 95009 4d5d78 95004->95009 95008 4d10a7 95010 4dbf07 8 API calls 95009->95010 95011 4d5d8f GetVersionExW 95010->95011 95012 4d84b7 8 API calls 95011->95012 95013 4d5ddc 95012->95013 95014 4d96d9 8 API calls 95013->95014 95028 4d5e12 95013->95028 95015 4d5e06 95014->95015 95017 4d79ed 8 API calls 95015->95017 95016 4d5ecc GetCurrentProcess IsWow64Process 95018 4d5ee8 95016->95018 95017->95028 95019 5150f2 GetSystemInfo 95018->95019 95020 4d5f00 LoadLibraryA 95018->95020 95021 4d5f4d GetSystemInfo 95020->95021 95022 4d5f11 GetProcAddress 95020->95022 95024 4d5f27 95021->95024 95022->95021 95023 4d5f21 GetNativeSystemInfo 95022->95023 95023->95024 95026 4d5f2b FreeLibrary 95024->95026 95027 4d109d 95024->95027 95025 5150ad 95026->95027 95029 4f0433 29 API calls __onexit 95027->95029 95028->95016 95028->95025 95029->95008 95030 4d105b 95035 4d522e 95030->95035 95032 4d106a 95066 4f0433 29 API calls __onexit 95032->95066 95034 4d1074 95036 4d523e __wsopen_s 95035->95036 95037 4dbf07 8 API calls 95036->95037 95038 4d52f4 95037->95038 95039 4d551b 10 API calls 95038->95039 95040 4d52fd 95039->95040 95067 4d51bf 95040->95067 95043 4d65a4 8 API calls 95044 4d5316 95043->95044 95045 4d684e 8 API calls 95044->95045 95046 4d5325 95045->95046 95047 4dbf07 8 API calls 95046->95047 95048 4d532e 95047->95048 95049 4dbceb 8 API calls 95048->95049 95050 4d5337 RegOpenKeyExW 95049->95050 95051 514bc0 RegQueryValueExW 95050->95051 95055 4d5359 95050->95055 95052 514c56 RegCloseKey 95051->95052 95053 514bdd 95051->95053 95052->95055 95065 514c68 _wcslen 95052->95065 95054 4f019b 8 API calls 95053->95054 95056 514bf6 95054->95056 95055->95032 95058 4d41a6 8 API calls 95056->95058 95057 4d627c 8 API calls 95057->95065 95059 514c01 RegQueryValueExW 95058->95059 95060 514c1e 95059->95060 95062 514c38 ISource 95059->95062 95061 4d84b7 8 API calls 95060->95061 95061->95062 95062->95052 95063 4db25f 8 API calls 95063->95065 95064 4d684e 8 API calls 95064->95065 95065->95055 95065->95057 95065->95063 95065->95064 95066->95034 95068 5122f0 __wsopen_s 95067->95068 95069 4d51cc GetFullPathNameW 95068->95069 95070 4d51ee 95069->95070 95071 4d84b7 8 API calls 95070->95071 95072 4d520c 95071->95072 95072->95043 95073 521a68 95074 521a70 95073->95074 95077 4dd4e5 95073->95077 95119 5379af 8 API calls __fread_nolock 95074->95119 95076 521a82 95120 537928 8 API calls __fread_nolock 95076->95120 95080 4f016b 8 API calls 95077->95080 95079 521aac 95081 4e02f0 230 API calls 95079->95081 95082 4dd539 95080->95082 95083 521ad3 95081->95083 95103 4dc2cd 95082->95103 95084 521ae7 95083->95084 95121 5560a2 53 API calls _wcslen 95083->95121 95088 4f016b 8 API calls 95096 4dd61e ISource 95088->95096 95089 521b04 95089->95077 95122 5379af 8 API calls __fread_nolock 95089->95122 95091 4dd8c1 ISource 95092 4dc34b 8 API calls 95091->95092 95099 4dd95c ISource 95091->95099 95092->95099 95093 4db3fe 8 API calls 95093->95096 95095 521f1c 95123 5355d9 8 API calls ISource 95095->95123 95096->95091 95096->95093 95096->95095 95098 521f37 95096->95098 95100 4dbe6d 8 API calls 95096->95100 95110 4dc34b 95096->95110 95102 4dd973 95099->95102 95118 4ee284 8 API calls ISource 95099->95118 95100->95096 95107 4dc2dd 95103->95107 95104 4dc2e5 95104->95088 95105 4f016b 8 API calls 95105->95107 95106 4dbf07 8 API calls 95106->95107 95107->95104 95107->95105 95107->95106 95108 4dc2cd 8 API calls 95107->95108 95109 4dbe6d 8 API calls 95107->95109 95108->95107 95109->95107 95111 4dc359 95110->95111 95117 4dc381 ISource 95110->95117 95112 4dc367 95111->95112 95113 4dc34b 8 API calls 95111->95113 95114 4dc34b 8 API calls 95112->95114 95115 4dc36d 95112->95115 95113->95112 95114->95115 95116 4dc780 8 API calls 95115->95116 95115->95117 95116->95117 95117->95096 95118->95099 95119->95076 95120->95079 95121->95089 95122->95089 95123->95098 95124 52506e 95130 4df7b0 ISource 95124->95130 95126 4e02f0 230 API calls 95126->95130 95127 4e1c50 8 API calls 95127->95130 95128 4dbdc1 39 API calls 95128->95130 95129 4dbf07 8 API calls 95129->95130 95130->95126 95130->95127 95130->95128 95130->95129 95131 4dfa91 95130->95131 95133 4dbe6d 8 API calls 95130->95133 95136 543ef6 81 API calls 95130->95136 95139 4eb2d6 230 API calls 95130->95139 95140 4f05d2 5 API calls __Init_thread_wait 95130->95140 95141 4f0433 29 API calls __onexit 95130->95141 95142 4f0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95130->95142 95143 555131 101 API calls 95130->95143 95144 55721e 230 API calls 95130->95144 95133->95130 95136->95130 95139->95130 95140->95130 95141->95130 95142->95130 95143->95130 95144->95130 95145 523bae 95166 53c72e 95145->95166 95147 523bb8 95149 53c72e Sleep 95147->95149 95150 523be3 95147->95150 95156 4def8b 95147->95156 95172 4ea9e5 9 API calls 95147->95172 95149->95147 95151 4db25f 8 API calls 95150->95151 95152 523c13 95151->95152 95173 4dbf39 39 API calls 95152->95173 95154 523c2f 95174 544384 8 API calls 95154->95174 95159 4df400 95156->95159 95158 4df047 95160 4df41f 95159->95160 95161 4df433 95159->95161 95175 4de910 95160->95175 95207 543ef6 81 API calls __wsopen_s 95161->95207 95164 4df42a 95164->95158 95165 524528 95165->95165 95168 53c739 95166->95168 95169 53c754 95166->95169 95167 53c782 95167->95147 95168->95147 95169->95167 95170 53c770 Sleep 95169->95170 95170->95167 95172->95147 95173->95154 95174->95158 95176 4e02f0 230 API calls 95175->95176 95194 4de94d 95176->95194 95177 523176 95214 543ef6 81 API calls __wsopen_s 95177->95214 95179 4de9bb ISource 95179->95164 95180 4dea73 95182 4ded85 95180->95182 95183 4dea7e 95180->95183 95181 4decaf 95184 523167 95181->95184 95185 4decc4 95181->95185 95182->95179 95190 4f019b 8 API calls 95182->95190 95187 4f016b 8 API calls 95183->95187 95213 556062 8 API calls 95184->95213 95189 4f016b 8 API calls 95185->95189 95186 4deb68 95191 4f019b 8 API calls 95186->95191 95195 4dea85 __fread_nolock 95187->95195 95201 4deb1a 95189->95201 95190->95195 95198 4dead9 ISource __fread_nolock 95191->95198 95192 4f016b 8 API calls 95193 4deaa6 95192->95193 95193->95198 95208 4dd210 230 API calls 95193->95208 95194->95177 95194->95179 95194->95180 95194->95182 95194->95186 95196 4f016b 8 API calls 95194->95196 95194->95198 95195->95192 95195->95193 95196->95194 95198->95181 95199 523156 95198->95199 95198->95201 95203 523131 95198->95203 95205 52310f 95198->95205 95209 4d4485 230 API calls 95198->95209 95212 543ef6 81 API calls __wsopen_s 95199->95212 95201->95164 95211 543ef6 81 API calls __wsopen_s 95203->95211 95210 543ef6 81 API calls __wsopen_s 95205->95210 95207->95165 95208->95198 95209->95198 95210->95201 95211->95201 95212->95201 95213->95177 95214->95179 95215 4df470 95218 4e9fa5 95215->95218 95217 4df47c 95219 4e9fc6 95218->95219 95224 4ea023 95218->95224 95221 4e02f0 230 API calls 95219->95221 95219->95224 95225 4e9ff7 95221->95225 95222 52800f 95222->95222 95223 4ea067 95223->95217 95224->95223 95227 543ef6 81 API calls __wsopen_s 95224->95227 95225->95223 95225->95224 95226 4dbe6d 8 API calls 95225->95226 95226->95224 95227->95222 95228 4d1033 95233 4d6686 95228->95233 95232 4d1042 95234 4dbf07 8 API calls 95233->95234 95235 4d66f4 95234->95235 95241 4d55cc 95235->95241 95238 4d6791 95239 4d1038 95238->95239 95244 4d68e6 8 API calls __fread_nolock 95238->95244 95240 4f0433 29 API calls __onexit 95239->95240 95240->95232 95245 4d55f8 95241->95245 95244->95238 95246 4d55eb 95245->95246 95247 4d5605 95245->95247 95246->95238 95247->95246 95248 4d560c RegOpenKeyExW 95247->95248 95248->95246 95249 4d5626 RegQueryValueExW 95248->95249 95250 4d565c RegCloseKey 95249->95250 95251 4d5647 95249->95251 95250->95246 95251->95250 95252 4ef9b1 95253 4ef9dc 95252->95253 95254 4ef9bb 95252->95254 95259 52fadc 95253->95259 95261 5355d9 8 API calls ISource 95253->95261 95255 4dc34b 8 API calls 95254->95255 95256 4ef9cb 95255->95256 95258 4dc34b 8 API calls 95256->95258 95260 4ef9db 95258->95260 95261->95253

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 115 4d5d78-4d5de7 call 4dbf07 GetVersionExW call 4d84b7 120 4d5ded 115->120 121 514f0c-514f1f 115->121 123 4d5def-4d5df1 120->123 122 514f20-514f24 121->122 126 514f27-514f33 122->126 127 514f26 122->127 124 514f4b 123->124 125 4d5df7-4d5e56 call 4d96d9 call 4d79ed 123->125 130 514f52-514f5e 124->130 139 4d5e5c-4d5e5e 125->139 140 5150ad-5150b4 125->140 126->122 129 514f35-514f37 126->129 127->126 129->123 132 514f3d-514f44 129->132 133 4d5ecc-4d5ee6 GetCurrentProcess IsWow64Process 130->133 132->121 135 514f46 132->135 137 4d5ee8 133->137 138 4d5f45-4d5f4b 133->138 135->124 141 4d5eee-4d5efa 137->141 138->141 142 4d5e64-4d5e67 139->142 143 514fae-514fc1 139->143 144 5150d4-5150d7 140->144 145 5150b6 140->145 146 5150f2-5150f6 GetSystemInfo 141->146 147 4d5f00-4d5f0f LoadLibraryA 141->147 142->133 148 4d5e69-4d5eab 142->148 149 514fc3-514fcc 143->149 150 514fea-514fec 143->150 152 5150c2-5150ca 144->152 153 5150d9-5150e8 144->153 151 5150bc 145->151 154 4d5f4d-4d5f57 GetSystemInfo 147->154 155 4d5f11-4d5f1f GetProcAddress 147->155 148->133 158 4d5ead-4d5eb0 148->158 159 514fd9-514fe5 149->159 160 514fce-514fd4 149->160 161 515021-515024 150->161 162 514fee-515003 150->162 151->152 152->144 153->151 163 5150ea-5150f0 153->163 157 4d5f27-4d5f29 154->157 155->154 156 4d5f21-4d5f25 GetNativeSystemInfo 155->156 156->157 164 4d5f2b-4d5f2c FreeLibrary 157->164 165 4d5f32-4d5f44 157->165 166 514f63-514f6d 158->166 167 4d5eb6-4d5ec0 158->167 159->133 160->133 170 515026-515041 161->170 171 51505f-515062 161->171 168 515010-51501c 162->168 169 515005-51500b 162->169 163->152 164->165 174 514f80-514f8a 166->174 175 514f6f-514f7b 166->175 167->130 177 4d5ec6 167->177 168->133 169->133 172 515043-515049 170->172 173 51504e-51505a 170->173 171->133 176 515068-51508f 171->176 172->133 173->133 178 514f9d-514fa9 174->178 179 514f8c-514f98 174->179 175->133 180 515091-515097 176->180 181 51509c-5150a8 176->181 177->133 178->133 179->133 180->133 181->133
                                            APIs
                                            • GetVersionExW.KERNEL32(?), ref: 004D5DA7
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                            • GetCurrentProcess.KERNEL32(?,0056DC2C,00000000,?,?), ref: 004D5ED3
                                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 004D5EDA
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 004D5F05
                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004D5F17
                                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 004D5F25
                                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 004D5F2C
                                            • GetSystemInfo.KERNEL32(?,?,?), ref: 004D5F51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                            • API String ID: 3290436268-3101561225
                                            • Opcode ID: e6a263527e33c8918efe66f36c4289d447523a3d30637dd1290f3e8c12de2ffa
                                            • Instruction ID: 120e2ecb97f98d343a64dc35f160a4078b2fac8a20075c17b79908e6c2d1bb40
                                            • Opcode Fuzzy Hash: e6a263527e33c8918efe66f36c4289d447523a3d30637dd1290f3e8c12de2ffa
                                            • Instruction Fuzzy Hash: 6EA16B3190A6C0CBDF11DB6C78461A97FA47B77300F145C9BE48997321D66C898DEB36

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,004D32EF,?), ref: 004D3342
                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,004D32EF,?), ref: 004D3355
                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,005A2418,005A2400,?,?,?,?,?,?,004D32EF,?), ref: 004D33C1
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                              • Part of subcall function 004D41E6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,004D33E9,005A2418,?,?,?,?,?,?,?,004D32EF,?), ref: 004D4227
                                            • SetCurrentDirectoryW.KERNELBASE(?,00000001,005A2418,?,?,?,?,?,?,?,004D32EF,?), ref: 004D3442
                                            • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00513C8A
                                            • SetCurrentDirectoryW.KERNEL32(?,005A2418,?,?,?,?,?,?,?,004D32EF,?), ref: 00513CCB
                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,005931F4,005A2418,?,?,?,?,?,?,?,004D32EF), ref: 00513D54
                                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 00513D5B
                                              • Part of subcall function 004D345A: GetSysColorBrush.USER32(0000000F), ref: 004D3465
                                              • Part of subcall function 004D345A: LoadCursorW.USER32(00000000,00007F00), ref: 004D3474
                                              • Part of subcall function 004D345A: LoadIconW.USER32(00000063), ref: 004D348A
                                              • Part of subcall function 004D345A: LoadIconW.USER32(000000A4), ref: 004D349C
                                              • Part of subcall function 004D345A: LoadIconW.USER32(000000A2), ref: 004D34AE
                                              • Part of subcall function 004D345A: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 004D34C6
                                              • Part of subcall function 004D345A: RegisterClassExW.USER32(?), ref: 004D3517
                                              • Part of subcall function 004D353A: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004D3568
                                              • Part of subcall function 004D353A: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 004D3589
                                              • Part of subcall function 004D353A: ShowWindow.USER32(00000000,?,?,?,?,?,?,004D32EF,?), ref: 004D359D
                                              • Part of subcall function 004D353A: ShowWindow.USER32(00000000,?,?,?,?,?,?,004D32EF,?), ref: 004D35A6
                                              • Part of subcall function 004D38F2: Shell_NotifyIconW.SHELL32(00000000,?), ref: 004D39C3
                                            Strings
                                            • AutoIt, xrefs: 00513C7F
                                            • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00513C84
                                            • 0$Z, xrefs: 004D341C
                                            • runas, xrefs: 00513D4F
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                            • String ID: 0$Z$AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                            • API String ID: 683915450-1862342204
                                            • Opcode ID: 5082802ae810dd314d060f56762a7c76647328ff2a1bb9fffbb878aed8099cfd
                                            • Instruction ID: 01dd8d5031be2b4ab168564a0734efae403795a1e4159ef04ab4ecf9da40004a
                                            • Opcode Fuzzy Hash: 5082802ae810dd314d060f56762a7c76647328ff2a1bb9fffbb878aed8099cfd
                                            • Instruction Fuzzy Hash: FE51EB30208341AADF01EF65AC7696E7FA4AF96748F04082FF44153362DE6C8A4DE767
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0053DCC1
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0053DCCF
                                            • Process32NextW.KERNEL32(00000000,?), ref: 0053DCEF
                                            • CloseHandle.KERNELBASE(00000000), ref: 0053DD9C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: 905e6ef806d9ea65b8c7fd915cca2e4e955b645990a42147c163be0935944667
                                            • Instruction ID: 7ff9d2abdc39bdab9137054f83a3b27bb5a6cc0ee6457d7436db8bbc327b36d7
                                            • Opcode Fuzzy Hash: 905e6ef806d9ea65b8c7fd915cca2e4e955b645990a42147c163be0935944667
                                            • Instruction Fuzzy Hash: 163172715083419FD301DF65D895BAFBBF8EF99354F04082EF581872A1DBB19948CBA2
                                            APIs
                                            • lstrlenW.KERNEL32(?,00514686), ref: 0053E397
                                            • GetFileAttributesW.KERNELBASE(?), ref: 0053E3A6
                                            • FindFirstFileW.KERNELBASE(?,?), ref: 0053E3B7
                                            • FindClose.KERNEL32(00000000), ref: 0053E3C3
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirstlstrlen
                                            • String ID:
                                            • API String ID: 2695905019-0
                                            • Opcode ID: b4a857834ffff03774a81fa88e8ac7f41f017d2c8372d9e59ec9b1b9b4c5fe31
                                            • Instruction ID: 58b20a86bc4d2c24defe794d0cd81b0cced5eee18d6ee9d0d0cae3b0a6e448db
                                            • Opcode Fuzzy Hash: b4a857834ffff03774a81fa88e8ac7f41f017d2c8372d9e59ec9b1b9b4c5fe31
                                            • Instruction Fuzzy Hash: 85F0A031815910578211673CAC0E8AA7BFCAE52335F104F11F836D30F0D7F0A99996A5
                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,004F504E,?,005998D8,0000000C,004F51A5,?,00000002,00000000), ref: 004F5099
                                            • TerminateProcess.KERNEL32(00000000,?,004F504E,?,005998D8,0000000C,004F51A5,?,00000002,00000000), ref: 004F50A0
                                            • ExitProcess.KERNEL32 ref: 004F50B2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: 984acb81e2f982ee4ff42b8af6e0a07f4eb460d995e5066eadf3aadfa67b87b9
                                            • Instruction ID: 7a644412ee3027e3147b97d79c3f2654eea461426ccf9c4f75ee75dd77b1d697
                                            • Opcode Fuzzy Hash: 984acb81e2f982ee4ff42b8af6e0a07f4eb460d995e5066eadf3aadfa67b87b9
                                            • Instruction Fuzzy Hash: C6E04F31900548AFCF116F18CD09E593F79FB50741F004815FA048B221DF79DD41DB95
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,?), ref: 0052E60A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID: X64
                                            • API String ID: 2645101109-893830106
                                            • Opcode ID: fe60837d77ba655516df2466d65c87b369f9860c54c0da97bcc69d5f269a4bee
                                            • Instruction ID: b953e5e945e03350158614cc851af4613ee8b49e3f232c4ce7f4a66be21b1f78
                                            • Opcode Fuzzy Hash: fe60837d77ba655516df2466d65c87b369f9860c54c0da97bcc69d5f269a4bee
                                            • Instruction Fuzzy Hash: 96D0C9B4C0112DEACB90CB90EC8CDDD777CBB18304F100552F106A2040D774A6499B20

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 4d3e15-4d3e45 call 4f019b call 4f016b 5 4d3e6e-4d3e80 call 4f919b 0->5 6 4d3e47-4d3e49 0->6 8 4d3e4a-4d3e50 5->8 13 4d3e82-4d3e94 call 4f919b 5->13 6->8 10 4d3e65-4d3e6b 8->10 11 4d3e52-4d3e62 call 4f015d call 4f01a4 8->11 11->10 19 514585-514587 13->19 20 4d3e9a-4d3eac call 4f919b 13->20 19->8 23 51458c-51458f 20->23 24 4d3eb2-4d3ec4 call 4f919b 20->24 23->8 27 514594-5145cb call 4d4154 call 4d4093 call 4d3fb8 call 4f4cf3 24->27 28 4d3eca-4d3edc call 4f919b 24->28 60 514608-51460b 27->60 61 5145cd-5145d8 27->61 33 51462e-514633 28->33 34 4d3ee2-4d3ef4 call 4f919b 28->34 33->8 38 514639-514655 call 4ee2e5 33->38 43 514677-514688 call 53a316 34->43 44 4d3efa-4d3f0c call 4f919b 34->44 46 514662-51466a 38->46 47 514657-51465b 38->47 56 51468a-5146d2 call 4db25f * 2 call 4d5379 call 4d3aa3 call 4dbd2c * 2 43->56 57 5146dc-5146e2 43->57 58 4d3f0e-4d3f20 call 4f919b 44->58 59 4d3f26 44->59 46->8 52 514670 46->52 47->38 51 51465d 47->51 51->8 52->43 79 514704-514706 56->79 105 5146d4-5146d7 56->105 63 5146f5-5146ff call 53a12a 57->63 58->8 58->59 68 4d3f29-4d3f2e call 4dad74 59->68 64 5145f6-514603 call 4f01a4 60->64 65 51460d-51461b 60->65 61->60 62 5145da-5145e1 61->62 62->64 69 5145e3-5145e7 62->69 63->79 64->63 78 514620-514629 call 4f01a4 65->78 75 4d3f33-4d3f35 68->75 69->64 76 5145e9-5145f4 69->76 81 5146e4-5146e9 75->81 82 4d3f3b-4d3f5e call 4d3fb8 call 4d4093 call 4f919b 75->82 76->78 78->8 79->8 81->8 87 5146ef-5146f0 81->87 101 4d3fb0-4d3fb3 82->101 102 4d3f60-4d3f72 call 4f919b 82->102 87->63 101->68 102->101 107 4d3f74-4d3f86 call 4f919b 102->107 105->8 110 4d3f9c-4d3fa5 107->110 111 4d3f88-4d3f9a call 4f919b 107->111 110->8 112 4d3fab 110->112 111->68 111->110 112->68
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                            • API String ID: 0-1645009161
                                            • Opcode ID: 8bb864abcc7f63ce4d59ec1ba1d9ca5955b79db95eb8126a91f301851888a535
                                            • Instruction ID: 0aece772e167af3ed28da6712e56df05af84d1b81a639b1275d885dd80b00dd2
                                            • Opcode Fuzzy Hash: 8bb864abcc7f63ce4d59ec1ba1d9ca5955b79db95eb8126a91f301851888a535
                                            • Instruction Fuzzy Hash: 3881FA71A40209BBEB11AF62CD56FAF3B64BF05705F04402BF9055B286EB78DA41C76A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 246 4d3696-4d36ab 247 4d36ad-4d36b0 246->247 248 4d370b-4d370d 246->248 249 4d3711 247->249 250 4d36b2-4d36b9 247->250 248->247 251 4d370f 248->251 255 4d3717-4d371c 249->255 256 513dce-513df6 call 4d2f24 call 4ef1c6 249->256 252 4d36bf-4d36c4 250->252 253 4d378b-4d3793 PostQuitMessage 250->253 254 4d36f6-4d36fe DefWindowProcW 251->254 257 4d36ca-4d36ce 252->257 258 513e3b-513e4f call 53c80c 252->258 261 4d373f-4d3741 253->261 260 4d3704-4d370a 254->260 262 4d371e-4d3721 255->262 263 4d3743-4d376a SetTimer RegisterWindowMessageW 255->263 292 513dfb-513e02 256->292 266 4d3795-4d379f call 4efcbb 257->266 267 4d36d4-4d36d9 257->267 258->261 285 513e55 258->285 261->260 264 4d3727-4d373a KillTimer call 4d388e call 4d572c 262->264 265 513d6f-513d72 262->265 263->261 268 4d376c-4d3777 CreatePopupMenu 263->268 264->261 277 513d74-513d78 265->277 278 513daa-513dc9 MoveWindow 265->278 287 4d37a4 266->287 272 513e20-513e27 267->272 273 4d36df-4d36e4 267->273 268->261 272->254 282 513e2d-513e36 call 531367 272->282 283 4d3779-4d3789 call 4d37a6 273->283 284 4d36ea-4d36f0 273->284 279 513d99-513da5 SetFocus 277->279 280 513d7a-513d7d 277->280 278->261 279->261 280->284 288 513d83-513d94 call 4d2f24 280->288 282->254 283->261 284->254 284->292 285->254 287->261 288->261 292->254 296 513e08-513e1b call 4d388e call 4d38f2 292->296 296->254
                                            APIs
                                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,004D3690,?,?), ref: 004D36FE
                                            • KillTimer.USER32(?,00000001,?,?,?,?,?,004D3690,?,?), ref: 004D372A
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004D374D
                                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,004D3690,?,?), ref: 004D3758
                                            • CreatePopupMenu.USER32 ref: 004D376C
                                            • PostQuitMessage.USER32(00000000), ref: 004D378D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                            • String ID: 0$Z$0$Z$TaskbarCreated
                                            • API String ID: 129472671-215663466
                                            • Opcode ID: 9508324a14183ec13e1a0a42e5529128a094b0a0cc7e732e0e66a0e3b5a4c49a
                                            • Instruction ID: 622ec2750f5efbf40ebf71c3393e3f0ccca1d6125fc2ccb33a2a77255e83ad8d
                                            • Opcode Fuzzy Hash: 9508324a14183ec13e1a0a42e5529128a094b0a0cc7e732e0e66a0e3b5a4c49a
                                            • Instruction Fuzzy Hash: 114126F12041406ADF241F6CDC2AB7E3F65F716352F04852BF512863A0CAAC8B45A62B

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 004D35DE
                                            • RegisterClassExW.USER32(00000030), ref: 004D3608
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004D3619
                                            • InitCommonControlsEx.COMCTL32(?), ref: 004D3636
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004D3646
                                            • LoadIconW.USER32(000000A9), ref: 004D365C
                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004D366B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 2914291525-1005189915
                                            • Opcode ID: 7ea43a7eb268a2fa7067444fa8f24faac4cc508e3396e5ad6a43d48c109bc94a
                                            • Instruction ID: 301c4112761a9ce441a7340d4f609b68452d19b78daa3661c84305e936b6dbd7
                                            • Opcode Fuzzy Hash: 7ea43a7eb268a2fa7067444fa8f24faac4cc508e3396e5ad6a43d48c109bc94a
                                            • Instruction Fuzzy Hash: 2821E5B1E05208AFDF00DF98EC49B9E7BB4FB19710F00451AF911A72A0D7B54588EFA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 303 5109fb-510a2b call 5107cf 306 510a46-510a52 call 5055b1 303->306 307 510a2d-510a38 call 4ff656 303->307 313 510a54-510a69 call 4ff656 call 4ff669 306->313 314 510a6b-510ab4 call 51073a 306->314 312 510a3a-510a41 call 4ff669 307->312 323 510d1d-510d23 312->323 313->312 321 510b21-510b2a GetFileType 314->321 322 510ab6-510abf 314->322 328 510b73-510b76 321->328 329 510b2c-510b5d GetLastError call 4ff633 CloseHandle 321->329 326 510ac1-510ac5 322->326 327 510af6-510b1c GetLastError call 4ff633 322->327 326->327 332 510ac7-510af4 call 51073a 326->332 327->312 330 510b78-510b7d 328->330 331 510b7f-510b85 328->331 329->312 340 510b63-510b6e call 4ff669 329->340 335 510b89-510bd7 call 5054fa 330->335 331->335 336 510b87 331->336 332->321 332->327 346 510be7-510c0b call 5104ed 335->346 347 510bd9-510be5 call 51094b 335->347 336->335 340->312 352 510c0d 346->352 353 510c1e-510c61 346->353 347->346 354 510c0f-510c19 call 508a3e 347->354 352->354 356 510c63-510c67 353->356 357 510c82-510c90 353->357 354->323 356->357 359 510c69-510c7d 356->359 360 510c96-510c9a 357->360 361 510d1b 357->361 359->357 360->361 362 510c9c-510ccf CloseHandle call 51073a 360->362 361->323 365 510cd1-510cfd GetLastError call 4ff633 call 5056c3 362->365 366 510d03-510d17 362->366 365->366 366->361
                                            APIs
                                              • Part of subcall function 0051073A: CreateFileW.KERNELBASE(00000000,00000000,?,00510AA4,?,?,00000000,?,00510AA4,00000000,0000000C), ref: 00510757
                                            • GetLastError.KERNEL32 ref: 00510B0F
                                            • __dosmaperr.LIBCMT ref: 00510B16
                                            • GetFileType.KERNELBASE(00000000), ref: 00510B22
                                            • GetLastError.KERNEL32 ref: 00510B2C
                                            • __dosmaperr.LIBCMT ref: 00510B35
                                            • CloseHandle.KERNEL32(00000000), ref: 00510B55
                                            • CloseHandle.KERNEL32(?), ref: 00510C9F
                                            • GetLastError.KERNEL32 ref: 00510CD1
                                            • __dosmaperr.LIBCMT ref: 00510CD8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                            • String ID: H
                                            • API String ID: 4237864984-2852464175
                                            • Opcode ID: 7a959e5a1813fa37760b2e868fd886fee9d83dfeaac94b224dd6a52f5dd6f453
                                            • Instruction ID: fb70a02547141c27f0401191725c9c4dc1dccf1aa9dccdfbe4185643513c9391
                                            • Opcode Fuzzy Hash: 7a959e5a1813fa37760b2e868fd886fee9d83dfeaac94b224dd6a52f5dd6f453
                                            • Instruction Fuzzy Hash: 09A13332A041598FEF19AF68D852BEE3FA0AF06324F14115DF801DB3E1CB759886CB65

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004D551B: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00514B50,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 004D5539
                                              • Part of subcall function 004D51BF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 004D51E1
                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004D534B
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00514BD7
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00514C18
                                            • RegCloseKey.ADVAPI32(?), ref: 00514C5A
                                            • _wcslen.LIBCMT ref: 00514CC1
                                            • _wcslen.LIBCMT ref: 00514CD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                            • API String ID: 98802146-2727554177
                                            • Opcode ID: b0dd64ba7870419cdd30e366e73b7907b68f053942139f3bfaf56f0a27bb2947
                                            • Instruction ID: ca1bd1c1731d37db11b7d8a72666bccc118645984881740d34c68f5d8199350d
                                            • Opcode Fuzzy Hash: b0dd64ba7870419cdd30e366e73b7907b68f053942139f3bfaf56f0a27bb2947
                                            • Instruction Fuzzy Hash: F2718171508300AED700EF66EC559ABBBF8FF95348B40082FF54587260EF759A48DBA5

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 004D3465
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004D3474
                                            • LoadIconW.USER32(00000063), ref: 004D348A
                                            • LoadIconW.USER32(000000A4), ref: 004D349C
                                            • LoadIconW.USER32(000000A2), ref: 004D34AE
                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 004D34C6
                                            • RegisterClassExW.USER32(?), ref: 004D3517
                                              • Part of subcall function 004D35AB: GetSysColorBrush.USER32(0000000F), ref: 004D35DE
                                              • Part of subcall function 004D35AB: RegisterClassExW.USER32(00000030), ref: 004D3608
                                              • Part of subcall function 004D35AB: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004D3619
                                              • Part of subcall function 004D35AB: InitCommonControlsEx.COMCTL32(?), ref: 004D3636
                                              • Part of subcall function 004D35AB: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004D3646
                                              • Part of subcall function 004D35AB: LoadIconW.USER32(000000A9), ref: 004D365C
                                              • Part of subcall function 004D35AB: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004D366B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                            • String ID: #$0$AutoIt v3
                                            • API String ID: 423443420-4155596026
                                            • Opcode ID: 20e0113f040b0ed6ead775303668d0c35870e12ec25f145abaf9541eac47f3fa
                                            • Instruction ID: d75d8bb59670a892f25e048932b7d126dee63309ab00abccd3b8323b2c526907
                                            • Opcode Fuzzy Hash: 20e0113f040b0ed6ead775303668d0c35870e12ec25f145abaf9541eac47f3fa
                                            • Instruction Fuzzy Hash: A6213C70E00314AFDF109FA9EC56B997FF4FB1AB51F00481BE504A72A0C3B94549AF90
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 004DCE8E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Init_thread_footer
                                            • String ID: p3Z$p3Z$p3Z$p3Z$p5Z$p5Z$x3Z$x3Z
                                            • API String ID: 1385522511-234116438
                                            • Opcode ID: 85c02cc9f68e06472fa67f5323c234003eea799cb548f2a7cb41c37478b80bf3
                                            • Instruction ID: 1f636e7e3f250852543b25ffafd3021586e39b2bff93bc7e068823a07972ff15
                                            • Opcode Fuzzy Hash: 85c02cc9f68e06472fa67f5323c234003eea799cb548f2a7cb41c37478b80bf3
                                            • Instruction Fuzzy Hash: F832DE74A002169FCF14CF58C895ABABBB5FF56304F18845BE906AB391C738ED41CB99

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 651 4d3aa3-4d3ac6 652 4d3acc-4d3b35 call 4f019b call 4d7953 call 4dbf07 call 4d7953 * 2 call 4d6e52 651->652 653 514139-51414c call 53a12a 651->653 687 4d3b3b-4d3b48 call 4d6cce call 4d6b12 652->687 688 51456b-51457b call 53a12a 652->688 660 514153-51415b 653->660 662 51416b-514173 660->662 663 51415d-514165 660->663 665 514175-51417c 662->665 666 51417e-514186 662->666 663->662 664 4d3b64-4d3bd3 call 4dbf07 call 4d3a70 call 4dbf07 call 4d557e call 4d41c9 call 4d6bfa 663->664 701 4d3bd9-4d3c48 call 4dbf07 * 2 call 4d694e call 4d7af4 SetCurrentDirectoryW call 4dbd2c * 2 call 4f019b call 4d41a6 664->701 702 5141b4-5141bf 664->702 669 5141a6-5141af call 53d4bf 665->669 670 514191-514199 666->670 671 514188-51418f 666->671 669->664 670->664 675 51419f-5141a1 670->675 671->669 675->669 698 4d3b4d-4d3b5e call 4d6afb 687->698 694 514580 688->694 694->694 698->660 698->664 749 4d3c4c-4d3c51 701->749 702->701 704 5141c5-5141f8 call 4d7953 call 4d636d 702->704 715 514502-514519 call 53a12a 704->715 716 5141fe-514225 call 5435cd call 4d63db 704->716 723 4d3da5-4d3df0 call 4dbd2c * 2 call 4d7953 call 4dbd2c call 4d7953 call 4f01a4 715->723 716->715 729 51422b-5142a7 call 4f016b call 4dbc23 call 4dbb3d 716->729 751 5142ad-5142cf call 4dbc23 729->751 752 51446f-5144ab call 4dbc23 call 5413a0 call 534a0c call 4f4d0e 729->752 753 4d3c57-4d3c64 call 4dad74 749->753 754 4d3d71-4d3d92 call 4d7953 SetCurrentDirectoryW 749->754 769 5142d1-5142e0 751->769 770 5142e5-5142f0 call 5414a6 751->770 804 5144ad-5144d2 call 4d5c10 call 4f01a4 call 541388 752->804 753->754 765 4d3c6a-4d3c86 call 4d4093 call 4d3ff3 753->765 754->723 766 4d3d94-4d3da2 call 4f015d call 4f01a4 754->766 793 4d3c8c-4d3ca3 call 4d3fb8 call 4f4cf3 765->793 794 51454e-514566 call 53a12a 765->794 766->723 775 514401-514414 call 4dbb3d 769->775 781 5142f2-514308 770->781 782 51430d-514318 call 541492 770->782 775->751 791 51441a-514424 775->791 781->775 800 51431a-514329 782->800 801 51432e-514339 call 4ee607 782->801 796 514457 call 53a486 791->796 797 514426-514434 791->797 820 4d3ca5-4d3cc0 call 4f6755 793->820 821 4d3cc6-4d3cc9 793->821 794->754 807 51445c-514469 796->807 797->796 798 514436-514455 call 4d40e0 797->798 798->807 800->775 801->775 816 51433f-51435b call 539f0d 801->816 804->723 807->751 807->752 831 51438a-51438d 816->831 832 51435d-514388 call 4db25f call 4dbd2c 816->832 820->821 823 4d3df3-4d3df9 820->823 822 4d3ccf-4d3cd4 821->822 821->823 827 4d3cda-4d3d13 call 4db25f call 4d3e15 822->827 828 51452f-514537 call 539dd5 822->828 823->822 830 4d3dff-51452a 823->830 859 4d3d15-4d3d2c call 4f01a4 call 4f015d 827->859 860 4d3d30-4d3d32 827->860 853 51453c-51453f 828->853 830->822 836 5143c9-5143cc 831->836 837 51438f-5143b5 call 4db25f call 4d7d27 call 4dbd2c 831->837 874 5143b6-5143c7 call 4dbc23 832->874 840 5143ed-5143f1 call 54142e 836->840 841 5143ce-5143d7 call 539e3c 836->841 837->874 854 5143f6-514400 call 4f01a4 840->854 857 5144d7-514500 call 53a12a call 4f01a4 call 4f4d0e 841->857 858 5143dd-5143e8 call 4f01a4 841->858 861 514545-514549 853->861 862 4d3e08-4d3e10 853->862 854->775 857->804 858->751 859->860 872 4d3d38-4d3d3b 860->872 873 4d3e04 860->873 861->862 869 4d3d5e-4d3d6b 862->869 869->749 869->754 872->862 879 4d3d41-4d3d44 872->879 873->862 874->854 879->853 883 4d3d4a-4d3d59 call 4d40e0 879->883 883->869
                                            APIs
                                              • Part of subcall function 004D7953: CloseHandle.KERNELBASE(?,?,00000000,00513A1C), ref: 004D7973
                                              • Part of subcall function 004D6E52: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,004D3B33,?,00008000), ref: 004D6E80
                                            • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,00000000), ref: 004D3C17
                                            • _wcslen.LIBCMT ref: 004D3C96
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 004D3D81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$CloseCreateFileHandle_wcslen
                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                            • API String ID: 3350465876-3738523708
                                            • Opcode ID: f1eeabfe504446115c18b84548605c72516dd65ec816f9c389a81512b627c54d
                                            • Instruction ID: 0f307e0db1ba9eed313bfcb470f2d67022fc5ce4ebc0422a22ac2d1f0369ce32
                                            • Opcode Fuzzy Hash: f1eeabfe504446115c18b84548605c72516dd65ec816f9c389a81512b627c54d
                                            • Instruction Fuzzy Hash: C52299715083419FDB10EF25C8A1AAFBBE5BF94308F00091FF585972A2DB749A89CB57
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: D5Z$D5Z$D5Z$D5Z$D5ZD5Z$Variable must be of type 'Object'.
                                            • API String ID: 0-1895104004
                                            • Opcode ID: 75af23e54bbc1fb7c5f72c47c9eef846ce45bf7feed3297a59d49bddc7373a97
                                            • Instruction ID: a219a54f459ab68ae9a8befed7b8a7d1a0d00886906e008e765a2ae3a8095daa
                                            • Opcode Fuzzy Hash: 75af23e54bbc1fb7c5f72c47c9eef846ce45bf7feed3297a59d49bddc7373a97
                                            • Instruction Fuzzy Hash: 70C29E71A00215DFCB24CF58C890BAEB7F1BF49304F24816BE946AB391D379AD46CB59
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 004E15A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Init_thread_footer
                                            • String ID: D5Z$D5Z$D5Z$D5Z$D5ZD5Z
                                            • API String ID: 1385522511-3374964535
                                            • Opcode ID: 4d7934dc44540e52bda8dcae0bb3b82ec08226acd16067de14543197820df658
                                            • Instruction ID: 4a856dfcc1652195e12661a2d14ba67dc8b1962193c2dc5434e53ab415e653cc
                                            • Opcode Fuzzy Hash: 4d7934dc44540e52bda8dcae0bb3b82ec08226acd16067de14543197820df658
                                            • Instruction Fuzzy Hash: A3B2B074A08380CFDB24CF1AC48062ABBE1BF99305F14495EF9958B391D779EC85CB96

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1857 4d2a52-4d2a8b 1858 5139f4-5139f5 DestroyWindow 1857->1858 1859 4d2a91-4d2aa7 mciSendStringW 1857->1859 1862 513a00-513a0d 1858->1862 1860 4d2aad-4d2ab5 1859->1860 1861 4d2d08-4d2d15 1859->1861 1860->1862 1863 4d2abb-4d2aca call 4d2e70 1860->1863 1864 4d2d3a-4d2d41 1861->1864 1865 4d2d17-4d2d32 UnregisterHotKey 1861->1865 1869 513a3c-513a43 1862->1869 1870 513a0f-513a12 1862->1870 1878 513a4a-513a56 1863->1878 1879 4d2ad0-4d2ad8 1863->1879 1864->1860 1868 4d2d47 1864->1868 1865->1864 1867 4d2d34-4d2d35 call 4d2712 1865->1867 1867->1864 1868->1861 1869->1862 1875 513a45 1869->1875 1871 513a14-513a1c call 4d7953 1870->1871 1872 513a1e-513a21 FindClose 1870->1872 1877 513a27-513a34 1871->1877 1872->1877 1875->1878 1877->1869 1881 513a36-513a37 call 543c0b 1877->1881 1884 513a60-513a67 1878->1884 1885 513a58-513a5a FreeLibrary 1878->1885 1882 4d2ade-4d2b03 call 4de650 1879->1882 1883 513a6e-513a7b 1879->1883 1881->1869 1895 4d2b3a-4d2b45 CoUninitialize 1882->1895 1896 4d2b05 1882->1896 1886 513aa2-513aa9 1883->1886 1887 513a7d-513a9a VirtualFree 1883->1887 1884->1878 1890 513a69 1884->1890 1885->1884 1886->1883 1892 513aab 1886->1892 1887->1886 1891 513a9c-513a9d call 543c71 1887->1891 1890->1883 1891->1886 1897 513ab0-513ab4 1892->1897 1895->1897 1899 4d2b4b-4d2b50 1895->1899 1898 4d2b08-4d2b38 call 4d3047 call 4d2ff0 1896->1898 1897->1899 1902 513aba-513ac0 1897->1902 1898->1895 1900 513ac5-513ad2 call 543c45 1899->1900 1901 4d2b56-4d2b60 1899->1901 1915 513ad4 1900->1915 1904 4d2d49-4d2d56 call 4efb27 1901->1904 1905 4d2b66-4d2b71 call 4dbd2c 1901->1905 1902->1899 1904->1905 1918 4d2d5c 1904->1918 1917 4d2b77 call 4d2f86 1905->1917 1920 513ad9-513afb call 4f015d 1915->1920 1919 4d2b7c-4d2be7 call 4d2e17 call 4f01a4 call 4d2dbe call 4dbd2c call 4de650 call 4d2e40 call 4f01a4 1917->1919 1918->1904 1919->1920 1946 4d2bed-4d2c11 call 4f01a4 1919->1946 1925 513afd 1920->1925 1928 513b02-513b24 call 4f015d 1925->1928 1934 513b26 1928->1934 1937 513b2b-513b4d call 4f015d 1934->1937 1944 513b4f 1937->1944 1947 513b54-513b61 call 536d63 1944->1947 1946->1928 1953 4d2c17-4d2c3b call 4f01a4 1946->1953 1952 513b63 1947->1952 1955 513b68-513b75 call 4ebd6a 1952->1955 1953->1937 1958 4d2c41-4d2c5b call 4f01a4 1953->1958 1961 513b77 1955->1961 1958->1947 1963 4d2c61-4d2c85 call 4d2e17 call 4f01a4 1958->1963 1964 513b7c-513b89 call 543b9f 1961->1964 1963->1955 1972 4d2c8b-4d2c93 1963->1972 1971 513b8b 1964->1971 1974 513b90-513b9d call 543c26 1971->1974 1972->1964 1973 4d2c99-4d2caa call 4dbd2c call 4d2f4c 1972->1973 1981 4d2caf-4d2cb7 1973->1981 1979 513b9f 1974->1979 1982 513ba4-513bb1 call 543c26 1979->1982 1981->1974 1983 4d2cbd-4d2ccb 1981->1983 1988 513bb3 1982->1988 1983->1982 1985 4d2cd1-4d2d07 call 4dbd2c * 3 call 4d2eb8 1983->1985 1988->1988
                                            APIs
                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 004D2A9B
                                            • CoUninitialize.COMBASE ref: 004D2B3A
                                            • UnregisterHotKey.USER32(?), ref: 004D2D1F
                                            • DestroyWindow.USER32(?), ref: 005139F5
                                            • FreeLibrary.KERNEL32(?), ref: 00513A5A
                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00513A87
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                            • String ID: close all
                                            • API String ID: 469580280-3243417748
                                            • Opcode ID: ff6cf2fa4be1cde4a5a7ee4525810e5ac597b3eb8ccf9f324eb941fe1e5ae271
                                            • Instruction ID: dc59492ea2e91397b3c4b117ffc173349049e47b2201b9df3944e2ff2d738d4d
                                            • Opcode Fuzzy Hash: ff6cf2fa4be1cde4a5a7ee4525810e5ac597b3eb8ccf9f324eb941fe1e5ae271
                                            • Instruction Fuzzy Hash: B0D1AB30701212CFDB19EF15C5A9A69FBA0BF14704F1442AFE84A6B352DB74AD52CF85

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1996 54874a-54878c call 5122f0 call 4d8e70 2001 5487a2 1996->2001 2002 54878e-54879c call 4dc92d 1996->2002 2004 5487a4-5487b0 2001->2004 2002->2001 2008 54879e-5487a0 2002->2008 2006 5487b6 2004->2006 2007 54886d-54891f call 4d8e70 call 4d557e call 4fd913 call 4f93c8 * 2 GetCurrentDirectoryW SetCurrentDirectoryW 2004->2007 2009 5487ba-5487c0 2006->2009 2041 548921-54892d call 53e387 2007->2041 2042 548973-548984 call 4de650 2007->2042 2008->2004 2011 5487c2-5487c8 2009->2011 2012 5487ca-5487cf 2009->2012 2014 5487d6 2011->2014 2016 5487d1-5487d4 2012->2016 2017 5487d9-5487df 2012->2017 2014->2017 2016->2014 2019 5487e1-5487e4 2017->2019 2020 548848-54884a 2017->2020 2019->2020 2023 5487e6-5487e9 2019->2023 2021 54884b-54884e 2020->2021 2024 548850-548856 2021->2024 2025 548858 2021->2025 2027 548844-548846 2023->2027 2028 5487eb-5487ee 2023->2028 2030 54885c-548867 2024->2030 2025->2030 2029 54883d-54883e 2027->2029 2028->2027 2032 5487f0-5487f3 2028->2032 2029->2021 2030->2007 2030->2009 2033 5487f5-5487f8 2032->2033 2034 548840-548842 2032->2034 2033->2034 2036 5487fa-5487fd 2033->2036 2034->2029 2038 5487ff-548802 2036->2038 2039 54883b 2036->2039 2038->2039 2043 548804-548807 2038->2043 2039->2029 2041->2042 2051 54892f-54893a call 53e9c5 2041->2051 2054 548987-54898b call 4dbd2c 2042->2054 2045 548834-548839 2043->2045 2046 548809-54880c 2043->2046 2045->2021 2046->2045 2049 54880e-548811 2046->2049 2052 548813-548816 2049->2052 2053 54882d-548832 2049->2053 2062 548940-548967 GetFileAttributesW SetFileAttributesW 2051->2062 2063 5489cf 2051->2063 2052->2053 2056 548818-54881b 2052->2056 2053->2021 2061 548990-548998 2054->2061 2059 548826-54882b 2056->2059 2060 54881d-548820 2056->2060 2059->2021 2060->2059 2064 54899b-5489af call 4de650 2060->2064 2066 5489b1-5489b3 2062->2066 2067 548969-548971 SetCurrentDirectoryW 2062->2067 2065 5489d3-5489ec call 549f9f 2063->2065 2064->2061 2071 548a02-548a0c SetCurrentDirectoryW 2065->2071 2076 5489ee-5489fb call 4de650 2065->2076 2070 5489b5-5489cd SetCurrentDirectoryW call 4f4d13 2066->2070 2066->2071 2067->2042 2070->2065 2071->2054 2076->2071
                                            APIs
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00548907
                                            • SetCurrentDirectoryW.KERNELBASE(?), ref: 0054891B
                                            • GetFileAttributesW.KERNEL32(?), ref: 00548945
                                            • SetFileAttributesW.KERNELBASE(?,00000000), ref: 0054895F
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00548971
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 005489BA
                                            • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,?), ref: 00548A0A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$AttributesFile
                                            • String ID: *.*
                                            • API String ID: 769691225-438819550
                                            • Opcode ID: 70aac3f2e59d212304a8ff81b64f8166d3bfcc501cde38e8eea21b16c2eaa3d3
                                            • Instruction ID: a15a4bf328c94e40a5699ac63cdf294328c66792be254e842a585c537d06b40a
                                            • Opcode Fuzzy Hash: 70aac3f2e59d212304a8ff81b64f8166d3bfcc501cde38e8eea21b16c2eaa3d3
                                            • Instruction Fuzzy Hash: FA81BD729042059BCB20EF15C894AFEBBE8BF94718F544C2EF885D7251EB35D944CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2079 5090d5-5090e5 2080 5090e7-5090fa call 4ff656 call 4ff669 2079->2080 2081 5090ff-509101 2079->2081 2098 509481 2080->2098 2083 509107-50910d 2081->2083 2084 509469-509476 call 4ff656 call 4ff669 2081->2084 2083->2084 2087 509113-50913e 2083->2087 2103 50947c call 502b7c 2084->2103 2087->2084 2090 509144-50914d 2087->2090 2091 509167-509169 2090->2091 2092 50914f-509162 call 4ff656 call 4ff669 2090->2092 2096 509465-509467 2091->2096 2097 50916f-509173 2091->2097 2092->2103 2100 509484-509489 2096->2100 2097->2096 2102 509179-50917d 2097->2102 2098->2100 2102->2092 2105 50917f-509196 2102->2105 2103->2098 2108 5091b3-5091bc 2105->2108 2109 509198-50919b 2105->2109 2112 5091da-5091e4 2108->2112 2113 5091be-5091d5 call 4ff656 call 4ff669 call 502b7c 2108->2113 2110 5091a5-5091ae 2109->2110 2111 50919d-5091a3 2109->2111 2116 50924f-509269 2110->2116 2111->2110 2111->2113 2114 5091e6-5091e8 2112->2114 2115 5091eb-5091ec call 503bb0 2112->2115 2143 50939c 2113->2143 2114->2115 2125 5091f1-509209 call 502d58 * 2 2115->2125 2118 50933d-509346 call 50fc3b 2116->2118 2119 50926f-50927f 2116->2119 2130 509348-50935a 2118->2130 2131 5093b9 2118->2131 2119->2118 2124 509285-509287 2119->2124 2124->2118 2128 50928d-5092b3 2124->2128 2152 509226-50924c call 5097b4 2125->2152 2153 50920b-509221 call 4ff669 call 4ff656 2125->2153 2128->2118 2133 5092b9-5092cc 2128->2133 2130->2131 2136 50935c-50936b GetConsoleMode 2130->2136 2135 5093bd-5093d5 ReadFile 2131->2135 2133->2118 2138 5092ce-5092d0 2133->2138 2140 509431-50943c GetLastError 2135->2140 2141 5093d7-5093dd 2135->2141 2136->2131 2142 50936d-509371 2136->2142 2138->2118 2144 5092d2-5092fd 2138->2144 2146 509455-509458 2140->2146 2147 50943e-509450 call 4ff669 call 4ff656 2140->2147 2141->2140 2148 5093df 2141->2148 2142->2135 2149 509373-50938d ReadConsoleW 2142->2149 2150 50939f-5093a9 call 502d58 2143->2150 2144->2118 2151 5092ff-509312 2144->2151 2159 509395-50939b call 4ff633 2146->2159 2160 50945e-509460 2146->2160 2147->2143 2155 5093e2-5093f4 2148->2155 2157 5093ae-5093b7 2149->2157 2158 50938f GetLastError 2149->2158 2150->2100 2151->2118 2162 509314-509316 2151->2162 2152->2116 2153->2143 2155->2150 2165 5093f6-5093fa 2155->2165 2157->2155 2158->2159 2159->2143 2160->2150 2162->2118 2169 509318-509338 2162->2169 2173 509413-50941e 2165->2173 2174 5093fc-50940c call 508df1 2165->2174 2169->2118 2179 509420 call 508f41 2173->2179 2180 50942a-50942f call 508c31 2173->2180 2184 50940f-509411 2174->2184 2185 509425-509428 2179->2185 2180->2185 2184->2150 2185->2184
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a0c34ae00c52ca970b1230f7e5c685412b897f391f71a00557b7a53e11c5e04
                                            • Instruction ID: 3d5e119b891de41fc3ee36b10d739b594a0cc22c32ac68b7a48ce7f6d3d927e6
                                            • Opcode Fuzzy Hash: 0a0c34ae00c52ca970b1230f7e5c685412b897f391f71a00557b7a53e11c5e04
                                            • Instruction Fuzzy Hash: 50C1EF70A0428AAFDF119FA8C845BADBFB0BF19300F184599E914AB3D3C7349946CF65

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004D3205: MapVirtualKeyW.USER32(0000005B,00000000), ref: 004D3236
                                              • Part of subcall function 004D3205: MapVirtualKeyW.USER32(00000010,00000000), ref: 004D323E
                                              • Part of subcall function 004D3205: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004D3249
                                              • Part of subcall function 004D3205: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004D3254
                                              • Part of subcall function 004D3205: MapVirtualKeyW.USER32(00000011,00000000), ref: 004D325C
                                              • Part of subcall function 004D3205: MapVirtualKeyW.USER32(00000012,00000000), ref: 004D3264
                                              • Part of subcall function 004D318C: RegisterWindowMessageW.USER32(00000004,?,004D2906), ref: 004D31E4
                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 004D29AC
                                            • OleInitialize.OLE32 ref: 004D29CA
                                            • CloseHandle.KERNEL32(00000000,00000000), ref: 005139E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                            • String ID: (&Z$0$Z$@(Z$$Z
                                            • API String ID: 1986988660-261712629
                                            • Opcode ID: ad81ef209c0949aa126d8eeda1c8695613684e60206534f611ba16f90d8ed4e4
                                            • Instruction ID: 31a02796e76c2f72f63e50404beef8b34d524f9e70714797348f408a0fbb2e8c
                                            • Opcode Fuzzy Hash: ad81ef209c0949aa126d8eeda1c8695613684e60206534f611ba16f90d8ed4e4
                                            • Instruction Fuzzy Hash: 21717DB0E052418E8788EF3EAD6B6153EE0FB6F308F00852EE509CB761EB744449AF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2230 4d353a-4d35aa CreateWindowExW * 2 ShowWindow * 2
                                            APIs
                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004D3568
                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 004D3589
                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,004D32EF,?), ref: 004D359D
                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,004D32EF,?), ref: 004D35A6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$CreateShow
                                            • String ID: AutoIt v3$edit
                                            • API String ID: 1584632944-3779509399
                                            • Opcode ID: 657b93deb01f553837626998d169cac2fe861f7b11db37c2790d58a21ea5a11d
                                            • Instruction ID: cb01d7b3e767446e8d168c6b59535c0e45540f8f1bd4f710d48bd8a9dd778931
                                            • Opcode Fuzzy Hash: 657b93deb01f553837626998d169cac2fe861f7b11db37c2790d58a21ea5a11d
                                            • Instruction Fuzzy Hash: 23F0D071A402947AEB31571B6C09F373EBDE7D7F50F00081EB90497160D5A51859FA70
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,004D55EB,SwapMouseButtons,00000004,?), ref: 004D561C
                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,004D55EB,SwapMouseButtons,00000004,?), ref: 004D563D
                                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,004D55EB,SwapMouseButtons,00000004,?), ref: 004D565F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID: Control Panel\Mouse
                                            • API String ID: 3677997916-824357125
                                            • Opcode ID: 0be2bff0f75c98047e80d5279050b77cd298aa9fd7b07fbe55678ca55c17e74d
                                            • Instruction ID: 572938410b98ef2677a25d52853837119a6aa7ff536692db4edd9cd23ad00137
                                            • Opcode Fuzzy Hash: 0be2bff0f75c98047e80d5279050b77cd298aa9fd7b07fbe55678ca55c17e74d
                                            • Instruction Fuzzy Hash: FA117C71610608BFDB208FA8CC44EAF77B8EF10744F40446BF809D7220EA71EE45A764
                                            APIs
                                            • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0052E73D
                                            • FreeLibrary.KERNEL32 ref: 0052E763
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: AddressFreeLibraryProc
                                            • String ID: GetSystemWow64DirectoryW$X64
                                            • API String ID: 3013587201-2590602151
                                            • Opcode ID: 8d9be09b3748026fb737fa02c63643b96558656cfcb2f2cd3c42654d8f13325d
                                            • Instruction ID: 19094ce42dfe18f5c8e6c13b98e28cf54d1efc03ec7c072dd228109661851dd0
                                            • Opcode Fuzzy Hash: 8d9be09b3748026fb737fa02c63643b96558656cfcb2f2cd3c42654d8f13325d
                                            • Instruction Fuzzy Hash: 2BE02B31D026709BDF725A246C49AAA3E34BF23701F180C55F801FB180DBB4DD48C2A8
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?,0056DC30), ref: 0053DABB
                                            • GetLastError.KERNEL32 ref: 0053DACA
                                            • CreateDirectoryW.KERNELBASE(?,00000000), ref: 0053DAD9
                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0056DC30), ref: 0053DB36
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                            • String ID:
                                            • API String ID: 2267087916-0
                                            • Opcode ID: 22d674f70a2febd87c297c3177ff1aade9997efdead6fc5839c489a697b0514a
                                            • Instruction ID: 653fce07712fad3a6f380e264a3b7b058714dd79478f3196f4332aa6431ece27
                                            • Opcode Fuzzy Hash: 22d674f70a2febd87c297c3177ff1aade9997efdead6fc5839c489a697b0514a
                                            • Instruction Fuzzy Hash: 9B21B5305082059F8710DF29D9A186BBBF4FE59368F154A1EF499C32A1D730DD09CF62
                                            APIs
                                            • GetOpenFileNameW.COMDLG32(?), ref: 00514115
                                              • Part of subcall function 004D557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004D5558,?,?,00514B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 004D559E
                                              • Part of subcall function 004D39DE: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004D39FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Name$Path$FileFullLongOpen
                                            • String ID: X$`uY
                                            • API String ID: 779396738-3912885437
                                            • Opcode ID: 982191d999057b06906f42782d9426109a026ac06a0d4daeba9d6843fd88607a
                                            • Instruction ID: 97b2f186904985cea9d1e61e3e852304d0813b49bfb1c31911515e2f4fc68d52
                                            • Opcode Fuzzy Hash: 982191d999057b06906f42782d9426109a026ac06a0d4daeba9d6843fd88607a
                                            • Instruction Fuzzy Hash: 4121A171A002489BDF01DF99C815AEE7BF8AF49304F00401BE508A7341DBF85A898FA6
                                            APIs
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004F09F8
                                              • Part of subcall function 004F3634: RaiseException.KERNEL32(?,?,?,004F0A1A,?,00000000,?,?,?,?,?,?,004F0A1A,00000000,00599758,00000000), ref: 004F3694
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004F0A15
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaise
                                            • String ID: Unknown exception
                                            • API String ID: 3476068407-410509341
                                            • Opcode ID: f13df9dd077471a491d5a308f047b0962d23e465e3dffde8a840547d8869439b
                                            • Instruction ID: 5da0c20321c8add8e9388ef4d38fbd9d3f472e785f967b374bc71797cb5e8668
                                            • Opcode Fuzzy Hash: f13df9dd077471a491d5a308f047b0962d23e465e3dffde8a840547d8869439b
                                            • Instruction Fuzzy Hash: BDF0F47090020DB39B10BAA6D802CBE7BAC9A40314B50412ABB14C15A3FB79DA0685C9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: LocalTime
                                            • String ID: %.3d$X64
                                            • API String ID: 481472006-1077770165
                                            • Opcode ID: b362c68aa056bd8c741716820a5ae4fa3e5ae7ffe05fafd5b3efe36db4446aad
                                            • Instruction ID: d4215438efa1ede6e79ceed8bd77c36a3c8afcf95998fa6993112941ee1b6c8e
                                            • Opcode Fuzzy Hash: b362c68aa056bd8c741716820a5ae4fa3e5ae7ffe05fafd5b3efe36db4446aad
                                            • Instruction Fuzzy Hash: 45D012B1D04068D5CF909B91EC4A8BD7B7CBF1E301F544C53F406A1080E638A50CA721
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00558C52
                                            • TerminateProcess.KERNEL32(00000000), ref: 00558C59
                                            • FreeLibrary.KERNEL32(?,?,?,?), ref: 00558E3A
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process$CurrentFreeLibraryTerminate
                                            • String ID:
                                            • API String ID: 146820519-0
                                            • Opcode ID: 7ea4e1646027db01f0591e6f989690488ae790c7abb34298396ecb3dc906f38a
                                            • Instruction ID: 600666ac2da300d1c5b3f4b346e634e90f63466d93654dc58ee2114665371a0c
                                            • Opcode Fuzzy Hash: 7ea4e1646027db01f0591e6f989690488ae790c7abb34298396ecb3dc906f38a
                                            • Instruction Fuzzy Hash: 60126B71A043419FC714DF28C494B2ABBE5FF84319F14895EE8899B352CB35E949CB92
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 004D6CA1
                                            • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 004D6CB1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 8622c788e35eba03e6b229d2ab9cc3482782a95e109d085b93828eea80f0982b
                                            • Instruction ID: 2ce566d0c9cdd30ffc1827d43d232b498c3d2934edf7e9dc15292a9ec8752047
                                            • Opcode Fuzzy Hash: 8622c788e35eba03e6b229d2ab9cc3482782a95e109d085b93828eea80f0982b
                                            • Instruction Fuzzy Hash: D8317A71A10609FFDB14CF68C980B99B7B4FB04714F15862BE81897340D7B5BE94CB94
                                            APIs
                                              • Part of subcall function 004D5F59: Shell_NotifyIconW.SHELL32(00000001,?), ref: 004D6049
                                            • KillTimer.USER32(?,00000001,?,?), ref: 004EFD44
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004EFD53
                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0052FDD3
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_Timer$Kill
                                            • String ID:
                                            • API String ID: 3500052701-0
                                            • Opcode ID: 525537d73cfba9b2d278b9fed6e34922c4d29ba903b396d821509cca3731a40c
                                            • Instruction ID: 62a4165e757e7eefa30c1f72e341d474f7493f3c4a196aff47abf12c4d11f9c5
                                            • Opcode Fuzzy Hash: 525537d73cfba9b2d278b9fed6e34922c4d29ba903b396d821509cca3731a40c
                                            • Instruction Fuzzy Hash: B731B471904354AFEB228F24A845BE7BFFCAF12308F0408AED59A97281C7745A89CB55
                                            APIs
                                            • CloseHandle.KERNELBASE(00000000,00000000,?,?,0050895C,?,00599CE8,0000000C), ref: 00508A94
                                            • GetLastError.KERNEL32(?,0050895C,?,00599CE8,0000000C), ref: 00508A9E
                                            • __dosmaperr.LIBCMT ref: 00508AC9
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseErrorHandleLast__dosmaperr
                                            • String ID:
                                            • API String ID: 2583163307-0
                                            • Opcode ID: e05bd02fc45d1aa57d610bb085a6e1d0c9a32abb301fa0c43c07c5d5831fefe0
                                            • Instruction ID: 980fd338160d3af971a259d1c22230d53a0f7db76bbef62e59293e8f39b3b77a
                                            • Opcode Fuzzy Hash: e05bd02fc45d1aa57d610bb085a6e1d0c9a32abb301fa0c43c07c5d5831fefe0
                                            • Instruction Fuzzy Hash: 250182327055604AD61423345889F7F2F45BBD1774F29061BF848DB5D2DF618CC996A4
                                            APIs
                                            • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,005097CA,FF8BC369,00000000,00000002,00000000), ref: 00509754
                                            • GetLastError.KERNEL32(?,005097CA,FF8BC369,00000000,00000002,00000000,?,00505EF1,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,004F6F61), ref: 0050975E
                                            • __dosmaperr.LIBCMT ref: 00509765
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastPointer__dosmaperr
                                            • String ID:
                                            • API String ID: 2336955059-0
                                            • Opcode ID: f63446ae2f944756e48b27349502e6919633aee182567926654a772425ab70ff
                                            • Instruction ID: b5f3341969610fa48788547c389b5476da60de401d8bec1190b148e3bcc5e720
                                            • Opcode Fuzzy Hash: f63446ae2f944756e48b27349502e6919633aee182567926654a772425ab70ff
                                            • Instruction Fuzzy Hash: 3D012833B20519ABCF059F99DC05C6E3F2AEF86320B240209FD149B2D1EB719D419BA0
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 004E2FB6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Init_thread_footer
                                            • String ID: CALL
                                            • API String ID: 1385522511-4196123274
                                            • Opcode ID: aeab915ba82cbb18e0ac0e7257be89949ed71d92e718a924643e84c4de25df9b
                                            • Instruction ID: b0cc21f21fd10a8a393004eba753781818f76d45b4c4cd4a0f51f0ba8774cc3b
                                            • Opcode Fuzzy Hash: aeab915ba82cbb18e0ac0e7257be89949ed71d92e718a924643e84c4de25df9b
                                            • Instruction Fuzzy Hash: 6922DE70608285DFC714CF16C884A2ABBF5BF89314F14895EF5868B3A2D7B9E941CB46
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,004D33E9,005A2418,?,?,?,?,?,?,?,004D32EF,?), ref: 004D4227
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FullNamePath_wcslen
                                            • String ID: $Z
                                            • API String ID: 4019309064-2657603024
                                            • Opcode ID: 57439c5be7428e6d740f24da8821f378c4693569be45ac3ec39bceb344bb9708
                                            • Instruction ID: c3c40d81d0429fd96f57eae27c40e015d70222405800bdd1c0ad1dac51e1b0ce
                                            • Opcode Fuzzy Hash: 57439c5be7428e6d740f24da8821f378c4693569be45ac3ec39bceb344bb9708
                                            • Instruction Fuzzy Hash: 2111A571A042099BCF00EBA59C12EDD77F8BF89354F0040ABF945D7391EE78A7849B25
                                            APIs
                                            • GetComputerNameW.KERNEL32(?,?), ref: 0052E6F3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ComputerName
                                            • String ID: X64
                                            • API String ID: 3545744682-893830106
                                            • Opcode ID: efc904ec87f6e409516ec815dca6200fee6451db4318ce6f48d66b776e4cd0ac
                                            • Instruction ID: fa361ab1811817e20722e1b8a2946cfdc832030cf810528db85395fb06eab39d
                                            • Opcode Fuzzy Hash: efc904ec87f6e409516ec815dca6200fee6451db4318ce6f48d66b776e4cd0ac
                                            • Instruction Fuzzy Hash: 44D0C9B4C05228EACF90CF80EC88DDD777CBB14300F100C56F002A2180D7746A489B20
                                            APIs
                                              • Part of subcall function 004D557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004D5558,?,?,00514B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 004D559E
                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00549665
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00549673
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringWrite$FullNamePath
                                            • String ID:
                                            • API String ID: 3876400906-0
                                            • Opcode ID: e0eb8844d703d7c0acda589884473bea786b1e7201223d8c7fa292f298106c8a
                                            • Instruction ID: 8284b46797886f4b351338ff9eb75f83d1fea913f283ae6bda8a85dc70f8512d
                                            • Opcode Fuzzy Hash: e0eb8844d703d7c0acda589884473bea786b1e7201223d8c7fa292f298106c8a
                                            • Instruction Fuzzy Hash: 1B1149396006259FCB00EB26C861D6EB7B5FF48328B05884AE856AB361CB34FC01CFD4
                                            APIs
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,004D3B33,?,00008000), ref: 004D6E80
                                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,004D3B33,?,00008000), ref: 005159A2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 9abdde4b13ca7e5365f14c1cc39c57bf73767a5b9b657c863b7406e4c2b6ca28
                                            • Instruction ID: 8ec9733c9740ee5ad5c81ec6748f998b847498c6fb123019a345cf3caad5a768
                                            • Opcode Fuzzy Hash: 9abdde4b13ca7e5365f14c1cc39c57bf73767a5b9b657c863b7406e4c2b6ca28
                                            • Instruction Fuzzy Hash: 79018031245225B6E3300A2ACC0EF977F98EF46774F118216BE986A2E0C7B45855CB94
                                            APIs
                                            • IsThemeActive.UXTHEME ref: 004D32C4
                                              • Part of subcall function 004D326D: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 004D3282
                                              • Part of subcall function 004D326D: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 004D3299
                                              • Part of subcall function 004D3312: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,004D32EF,?), ref: 004D3342
                                              • Part of subcall function 004D3312: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,004D32EF,?), ref: 004D3355
                                              • Part of subcall function 004D3312: GetFullPathNameW.KERNEL32(00007FFF,?,?,005A2418,005A2400,?,?,?,?,?,?,004D32EF,?), ref: 004D33C1
                                              • Part of subcall function 004D3312: SetCurrentDirectoryW.KERNELBASE(?,00000001,005A2418,?,?,?,?,?,?,?,004D32EF,?), ref: 004D3442
                                            • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 004D32FE
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                            • String ID:
                                            • API String ID: 1550534281-0
                                            • Opcode ID: 49a71325da6e4217893979e1742bcbf2e218f52df1c909f6a306d78bbcda03d2
                                            • Instruction ID: fba8450c8cb7d341d002aa58a4d67b31469f0309904854690ea1dd48f59e61f7
                                            • Opcode Fuzzy Hash: 49a71325da6e4217893979e1742bcbf2e218f52df1c909f6a306d78bbcda03d2
                                            • Instruction Fuzzy Hash: D4F0B431A043449FEB006F68ED0BB243BA0A72730AF004C0BF608865E2CBBD8448AB05
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: SleepTimetime
                                            • String ID:
                                            • API String ID: 346578373-0
                                            • Opcode ID: c5d88f87c6e18f8b5dabeea3b8b00d748e4e487e1f03c774cf976a71d2927640
                                            • Instruction ID: daa7e31d35b713c47ec5987bd9b7ada2fbf0938d2fb06bed5b532c387257d36b
                                            • Opcode Fuzzy Hash: c5d88f87c6e18f8b5dabeea3b8b00d748e4e487e1f03c774cf976a71d2927640
                                            • Instruction Fuzzy Hash: 43F0E2B12006059FC300EB6AD455B56B7F4FF45310F00042FE44AC7350DBB0A800CB95
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,00000001,?,?,?,004DAE65,?,?,?), ref: 004D8793
                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,004DAE65,?,?,?), ref: 004D87C9
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide
                                            • String ID:
                                            • API String ID: 626452242-0
                                            • Opcode ID: 907d4fc523d5f94a73658b702be56e1b5d2687c455d3d288c8fb932ea21f2241
                                            • Instruction ID: 236be44015688903eae04f863be2b6b51a09cd8fc1beee6127f1eeee133453d6
                                            • Opcode Fuzzy Hash: 907d4fc523d5f94a73658b702be56e1b5d2687c455d3d288c8fb932ea21f2241
                                            • Instruction Fuzzy Hash: FD01D4713001047FEB196B6A9D5BF7F7AADDB85740F10002FB102DA291EDA09C009228
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b7842580bf1ba0e02ab2c8957f5bcc7ddcbe1261dddd9713f08a196854d8435d
                                            • Instruction ID: a31c2dd82223f59728f492fda1279f658e683763386e43327ae5e08723382cbc
                                            • Opcode Fuzzy Hash: b7842580bf1ba0e02ab2c8957f5bcc7ddcbe1261dddd9713f08a196854d8435d
                                            • Instruction Fuzzy Hash: E8511D36A0010CAFDB10DF58C840B7A7BB1EF85364F1A81A9ED049B391C736DD46CB54
                                            APIs
                                            • CharLowerBuffW.USER32(?,?), ref: 0053FBE3
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: BuffCharLower
                                            • String ID:
                                            • API String ID: 2358735015-0
                                            • Opcode ID: 120b617f37a95c229bbae49697929a1f580b82e70db90cfb591917149b85c003
                                            • Instruction ID: 7a81e3e4d8d4a9e4f7f7ef2fec707b8560b464f1ad4c41d598c387f9cd31e387
                                            • Opcode Fuzzy Hash: 120b617f37a95c229bbae49697929a1f580b82e70db90cfb591917149b85c003
                                            • Instruction Fuzzy Hash: 0341A1B2A0020DAFDB11AF65C8859AEBBB8FF44314F11893FE91697251EB70DE04CB50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction ID: 781f9986c800e3c513c66f2f79f39a00e49579a5570a159eabd1ddf07621f2f2
                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction Fuzzy Hash: 6F31D974A00109DFC718CF58E480A7AF7A5FB99300B6486A6E50ACB356DB35EDC1CBD9
                                            APIs
                                              • Part of subcall function 004D557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004D5558,?,?,00514B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 004D559E
                                            • GetPrivateProfileStringW.KERNEL32(?,?,?,?,0000FFFF,?), ref: 00548EBE
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FullNamePathPrivateProfileString
                                            • String ID:
                                            • API String ID: 1991638491-0
                                            • Opcode ID: 98784316dfd0f7f073df6cf93070ffc84cec2ce643a3b1af7f959d9ef291bba9
                                            • Instruction ID: 798b0c1fae79d162cfc952b6e89da0905629b45d6326d081a4d694db3041446e
                                            • Opcode Fuzzy Hash: 98784316dfd0f7f073df6cf93070ffc84cec2ce643a3b1af7f959d9ef291bba9
                                            • Instruction Fuzzy Hash: 97216F35600609AFCB00EB65C952CAEBBB5EF58324B04405AFA45AB3A1CB34FD51CBD4
                                            APIs
                                              • Part of subcall function 004D6332: LoadLibraryA.KERNEL32(kernel32.dll,?,?,004D637F,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D633E
                                              • Part of subcall function 004D6332: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 004D6350
                                              • Part of subcall function 004D6332: FreeLibrary.KERNEL32(00000000,?,?,004D637F,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D6362
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D639F
                                              • Part of subcall function 004D62FB: LoadLibraryA.KERNEL32(kernel32.dll,?,?,005154C3,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D6304
                                              • Part of subcall function 004D62FB: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 004D6316
                                              • Part of subcall function 004D62FB: FreeLibrary.KERNEL32(00000000,?,?,005154C3,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D6329
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressFreeProc
                                            • String ID:
                                            • API String ID: 2632591731-0
                                            • Opcode ID: e3449b93b63cda9f576e7aa9ae9a36607e786e898f2e8917b1bd05e8345c3478
                                            • Instruction ID: 2ad80560edf384b2c52f50e4ad413bc74ca4a31289188cb98c8a02672c5b06cf
                                            • Opcode Fuzzy Hash: e3449b93b63cda9f576e7aa9ae9a36607e786e898f2e8917b1bd05e8345c3478
                                            • Instruction Fuzzy Hash: A9112B31600205AADF10FB25DC22AAD77A1AF50719F11842FF942A72D1EEB89A459B54
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: __wsopen_s
                                            • String ID:
                                            • API String ID: 3347428461-0
                                            • Opcode ID: 642ef22842c51b600b67178b85f992f0f043a5dcca73cb3d5582329285062b09
                                            • Instruction ID: ddd6525b71a05f87bb1f5206dff920d21e42c8b490ab4f00b17dbb78c8581b7b
                                            • Opcode Fuzzy Hash: 642ef22842c51b600b67178b85f992f0f043a5dcca73cb3d5582329285062b09
                                            • Instruction Fuzzy Hash: 2C11487190410AAFCF05DF58E941EEE7BF9FF48310F144069F808AB352DA31EA118BA4
                                            APIs
                                            • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,004D6B73,?,00010000,00000000,00000000,00000000,00000000), ref: 004DB0AC
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 26a5bc61a9db2350a41dedfe3aadc57fd6c0d85543d05bc5f9ac4fc166e10dad
                                            • Instruction ID: 206f5141e6fd4fb9c3ff735de4801bd97dd0ab18066bd7011809da8d5449f64e
                                            • Opcode Fuzzy Hash: 26a5bc61a9db2350a41dedfe3aadc57fd6c0d85543d05bc5f9ac4fc166e10dad
                                            • Instruction Fuzzy Hash: BF116A35200704DFD721CE06C490B63B7E9EF45354F01C42FE9AA87B50CBB5A945CBA4
                                            APIs
                                              • Part of subcall function 0050500D: RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,005031B9,00000001,00000364,?,?,?,0000000A,00000000), ref: 0050504E
                                            • _free.LIBCMT ref: 005053FC
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_free
                                            • String ID:
                                            • API String ID: 614378929-0
                                            • Opcode ID: fba82c0aa068c5562b6699b73bb903d727f3ae0d836859c59312de60e55cd848
                                            • Instruction ID: ed360d7e27d96e532760aeb30a3b58d18282cb93f89e84a7fc27e4f768c3e48c
                                            • Opcode Fuzzy Hash: fba82c0aa068c5562b6699b73bb903d727f3ae0d836859c59312de60e55cd848
                                            • Instruction Fuzzy Hash: 270126B22047056BE3218E65D849A9EFFDCFB89370F250A1DE1C4832C0FA70A905CB74
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aea155f1e03846a7945f3ef32b85c3da0dbec0b08e6aeb419bf15716d252f37c
                                            • Instruction ID: e6ea59a5d0f351c5381d6e4ed6507b2c17bd9e4216c045f0018eb683c88d58b1
                                            • Opcode Fuzzy Hash: aea155f1e03846a7945f3ef32b85c3da0dbec0b08e6aeb419bf15716d252f37c
                                            • Instruction Fuzzy Hash: 7AF0F97290062956D6213E679C09F7F3658AF81335F14071BF665921E1DFF8980285BA
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,005031B9,00000001,00000364,?,?,?,0000000A,00000000), ref: 0050504E
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: b0b591a86fccf04fc7da6cd1bb3298fccf4015b98ada259b3d0feaed461ea30a
                                            • Instruction ID: 853ab9ffd8d53d44788d2a2c94cd497f2ed888d3e572ec145929d8d55864821f
                                            • Opcode Fuzzy Hash: b0b591a86fccf04fc7da6cd1bb3298fccf4015b98ada259b3d0feaed461ea30a
                                            • Instruction Fuzzy Hash: 4CF0B431604924A7DB315A679C19B6F3F58BF417A1B144116AE05961D0EA74D8048EE0
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000000,?,?,?,004F6A99,?,0000015D,?,?,?,?,004F85D0,000000FF,00000000,?,?), ref: 00503BE2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: c02b8b499270d097d5e1c443e9c1c726c593946c4d93b9a9ed9d949dd99264b5
                                            • Instruction ID: f90011f5fb578948abebcfe47f46b52a8d43371f23f6694a2ef758a7fc33c5ce
                                            • Opcode Fuzzy Hash: c02b8b499270d097d5e1c443e9c1c726c593946c4d93b9a9ed9d949dd99264b5
                                            • Instruction Fuzzy Hash: 97E0ED3120462857EB202A6B9C01F6E3E5CFF027A8F150122EE06D60E0EB79DE0082E5
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e5e2a6b15f93cba972de44ce2871348d540b75fe994d7692791c49b6c3f518f9
                                            • Instruction ID: 9d0fa393e4230fc4d66591123fcf1a56a97328ac96464aef748b67054c62b10f
                                            • Opcode Fuzzy Hash: e5e2a6b15f93cba972de44ce2871348d540b75fe994d7692791c49b6c3f518f9
                                            • Instruction Fuzzy Hash: 07F08570600702CFCB348F24D4A0822BBE1BF1032A3218A3FE2C782620C775A880DB14
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: __fread_nolock
                                            • String ID:
                                            • API String ID: 2638373210-0
                                            • Opcode ID: 246872d857331b2299f9d721c1e21c3e63b90e22c0d4325a9684d784a7ce1dac
                                            • Instruction ID: cfae43ce4ad5159c199a407d7dcd7f9f19774a7aaded02ff8d825588626b6b81
                                            • Opcode Fuzzy Hash: 246872d857331b2299f9d721c1e21c3e63b90e22c0d4325a9684d784a7ce1dac
                                            • Instruction Fuzzy Hash: EEF0F87140020DFFDF05DF90C941EAE7B79FB04318F208549F9159A251D336DA61EBA1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _wcslen
                                            • String ID:
                                            • API String ID: 176396367-0
                                            • Opcode ID: cc851593f1fd2b35ed972b3ca0519c9d6ab1506275115f6254acfd33543c89c1
                                            • Instruction ID: 0d1622c8b043a71cd659bdc734909df557b735ebca80010471a94a56cee51f70
                                            • Opcode Fuzzy Hash: cc851593f1fd2b35ed972b3ca0519c9d6ab1506275115f6254acfd33543c89c1
                                            • Instruction Fuzzy Hash: 26D0A72334205435B669313E2D0BC7F451CCBC26A4B05003FFB03CA1AAEC484C0300F4
                                            APIs
                                            • GetShortPathNameW.KERNELBASE(?,?,00007FFF), ref: 0053E7A2
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: NamePathShort_wcslen
                                            • String ID:
                                            • API String ID: 2021730007-0
                                            • Opcode ID: f65713566f94455e674a4d13102020a320dd37469a2a3597621453c08735bfeb
                                            • Instruction ID: 41fdcba6141b52583f1eb0d32f2bac6c842f9d6f8c57549708cd5af829c30088
                                            • Opcode Fuzzy Hash: f65713566f94455e674a4d13102020a320dd37469a2a3597621453c08735bfeb
                                            • Instruction Fuzzy Hash: 91E0CD76A0022557C71092599C05FEE77EDEFC8790F044075FD09D7248DDA8ED8085A0
                                            APIs
                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004D39FD
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: LongNamePath_wcslen
                                            • String ID:
                                            • API String ID: 541455249-0
                                            • Opcode ID: 3d52461e97ff8b2fab2c5bd1526ae3f298e796570939989909bf3e5e410be483
                                            • Instruction ID: 0987aab283abd293258878f2a75b6fe6673918bfcd90ed62093f5d78f20ef00e
                                            • Opcode Fuzzy Hash: 3d52461e97ff8b2fab2c5bd1526ae3f298e796570939989909bf3e5e410be483
                                            • Instruction Fuzzy Hash: A2E0CD76A0012557C71092589C05FEA77EDDFC8790F044075FC09D7248DDB8ED8095A0
                                            APIs
                                            • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 0053E76C
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FolderPath_wcslen
                                            • String ID:
                                            • API String ID: 2987691875-0
                                            • Opcode ID: c1d85488d97ffa06e40159aabd1aaeae186f999ac326cca9434650c722f927d9
                                            • Instruction ID: b11d94cc83b7feb2a917cdaeab6a55b6be49292a2062fffd907c8f39c1d1d5fe
                                            • Opcode Fuzzy Hash: c1d85488d97ffa06e40159aabd1aaeae186f999ac326cca9434650c722f927d9
                                            • Instruction Fuzzy Hash: 5DD05EA1A003282BDF60A6759C0DDB73AACC784254F004AA5786DD3242ED74ED4486B0
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,00000000,?,00510AA4,?,?,00000000,?,00510AA4,00000000,0000000C), ref: 00510757
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 578fce36613a5fd1ba2667cbffbf24b99fe565d4990cdda195160eeaf3658503
                                            • Instruction ID: c8c0519cac395ab5c26e6c8ad49bd00f9efcfa7e3e391f4d30f5b31d8741f37a
                                            • Opcode Fuzzy Hash: 578fce36613a5fd1ba2667cbffbf24b99fe565d4990cdda195160eeaf3658503
                                            • Instruction Fuzzy Hash: B4D06C3210010DBBDF028F84DD06EDA3BAAFB4C714F014000FE1856020C772E821EB90
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?,0053D755), ref: 0053E9C6
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 322a54e68fd460aa53408cc51592aaa4838d198bc7244024570b2fe80001a264
                                            • Instruction ID: d88e40a4c7e617d67ba036d4082432622660e9e44296f3dc3169e873bf54d0ed
                                            • Opcode Fuzzy Hash: 322a54e68fd460aa53408cc51592aaa4838d198bc7244024570b2fe80001a264
                                            • Instruction Fuzzy Hash: 51B0922900061005BD780A3C1A1A2FA2B9078533A6BD81BD5E4BA961F2C339880BE720
                                            APIs
                                            • CloseHandle.KERNELBASE(?,?,00000000,00513A1C), ref: 004D7973
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID:
                                            • API String ID: 2962429428-0
                                            • Opcode ID: 184da32c705bbb7f5b3c94e0b4f45c6835ce497674ec2d306a1d55c73af37b71
                                            • Instruction ID: 5ba1820955d0d9a5ff926c0196c314934f1239733d44982787c9f628c33a5fd9
                                            • Opcode Fuzzy Hash: 184da32c705bbb7f5b3c94e0b4f45c6835ce497674ec2d306a1d55c73af37b71
                                            • Instruction Fuzzy Hash: 09E092B6904B12CFD3314F1AE864412FBF4FEE63613204A6FD0E582760E3B4588ADB54
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0054A11B
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0054A176
                                            • FindClose.KERNEL32(00000000), ref: 0054A181
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0054A19D
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0054A1ED
                                            • SetCurrentDirectoryW.KERNEL32(00597B94), ref: 0054A20B
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0054A215
                                            • FindClose.KERNEL32(00000000), ref: 0054A222
                                            • FindClose.KERNEL32(00000000), ref: 0054A232
                                              • Part of subcall function 0053E2AE: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0053E2C9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                            • String ID: *.*
                                            • API String ID: 2640511053-438819550
                                            • Opcode ID: 455fbfd029ec0d55c973ae7b785518f65b6bea775809dc3da7ea63f21a015127
                                            • Instruction ID: 068fe36179dfb53d9fa22a9b848d955240b10bb82f0a86a638157a266ba122f2
                                            • Opcode Fuzzy Hash: 455fbfd029ec0d55c973ae7b785518f65b6bea775809dc3da7ea63f21a015127
                                            • Instruction Fuzzy Hash: 2931243664420D7ADF10AFB4DC08ADE7BBCBF09328F100556E911A3190EBB5CE44DA61
                                            APIs
                                              • Part of subcall function 0055D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0055C00D,?,?), ref: 0055D314
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D350
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D3C7
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D3FD
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0055C89D
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0055C908
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0055C92C
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0055C98B
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0055CA46
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0055CAB3
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0055CB48
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0055CB99
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0055CC42
                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0055CCE1
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0055CCEE
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                            • String ID:
                                            • API String ID: 3102970594-0
                                            • Opcode ID: 9b9e7cc2c7be7914c87a0e09d69a7d421fdd6213f95a45553062c44126e5b1f9
                                            • Instruction ID: c5bd69e612affd343c4aee690c34b0ae82db067252b4773965e6d5c471a52005
                                            • Opcode Fuzzy Hash: 9b9e7cc2c7be7914c87a0e09d69a7d421fdd6213f95a45553062c44126e5b1f9
                                            • Instruction Fuzzy Hash: 3B021D716042009FD714DF29C8A5E2ABBE5FF48318F18849EE84ADB3A2D735ED45CB91
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 0053A572
                                            • GetAsyncKeyState.USER32(000000A0), ref: 0053A5F3
                                            • GetKeyState.USER32(000000A0), ref: 0053A60E
                                            • GetAsyncKeyState.USER32(000000A1), ref: 0053A628
                                            • GetKeyState.USER32(000000A1), ref: 0053A63D
                                            • GetAsyncKeyState.USER32(00000011), ref: 0053A655
                                            • GetKeyState.USER32(00000011), ref: 0053A667
                                            • GetAsyncKeyState.USER32(00000012), ref: 0053A67F
                                            • GetKeyState.USER32(00000012), ref: 0053A691
                                            • GetAsyncKeyState.USER32(0000005B), ref: 0053A6A9
                                            • GetKeyState.USER32(0000005B), ref: 0053A6BB
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: 8dccd826ced9e8c3aa54d3c490eaafbbf4d98ef94c10ebab5395b7f4889351a4
                                            • Instruction ID: 9dc68e78c7575772045ba9979f1bdf01edb04de3ba39fb992eb1ac585b20d90f
                                            • Opcode Fuzzy Hash: 8dccd826ced9e8c3aa54d3c490eaafbbf4d98ef94c10ebab5395b7f4889351a4
                                            • Instruction Fuzzy Hash: 43419174E087C96AFF318B6488153A5BFA0BB21344F08845DD5C64B6C2EBE499C88B63
                                            APIs
                                            • CoInitialize.OLE32 ref: 005540D1
                                            • CoUninitialize.OLE32 ref: 005540DC
                                            • CoCreateInstance.OLE32(?,00000000,00000017,00570B44,?), ref: 00554136
                                            • IIDFromString.OLE32(?,?), ref: 005541A9
                                            • VariantInit.OLEAUT32(?), ref: 00554241
                                            • VariantClear.OLEAUT32(?), ref: 00554293
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                            • API String ID: 636576611-1287834457
                                            • Opcode ID: c50675cf2c87388ec4c43b44ae671856e2a808af48ae6522698a927a5723eba7
                                            • Instruction ID: d055899a1b153a43d583dd889fd6a5115116438be834c6d8ca5e9b4e0a3b635d
                                            • Opcode Fuzzy Hash: c50675cf2c87388ec4c43b44ae671856e2a808af48ae6522698a927a5723eba7
                                            • Instruction Fuzzy Hash: 92619D746087119FC710DF65C858B6ABBE8BF99759F10080EF9859B291CB70ED88CF92
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 0054A4D5
                                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 0054A5E8
                                              • Part of subcall function 005441CE: GetInputState.USER32 ref: 00544225
                                              • Part of subcall function 005441CE: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005442C0
                                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 0054A505
                                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 0054A5D2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                            • String ID: *.*
                                            • API String ID: 1972594611-438819550
                                            • Opcode ID: 25ee70a016471768c12de9553a32ed41ae07e659f979b220696676b35c99cbfd
                                            • Instruction ID: 1d8ecaa24939283a7fc5ec0faf7761fe0a7a8165cdf90ce7107ef738aadf208e
                                            • Opcode Fuzzy Hash: 25ee70a016471768c12de9553a32ed41ae07e659f979b220696676b35c99cbfd
                                            • Instruction Fuzzy Hash: 5C41BE7194020AAFDF50DFA4C949AEEBFB4FF14318F20445AE805A3291EB749E84CB61
                                            APIs
                                            • DefDlgProcW.USER32(?,?), ref: 004D22EE
                                            • GetSysColor.USER32(0000000F), ref: 004D23C3
                                            • SetBkColor.GDI32(?,00000000), ref: 004D23D6
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Color$Proc
                                            • String ID:
                                            • API String ID: 929743424-0
                                            • Opcode ID: e517f1f3d29eea0e2abac41e83982ecc7ef006b46fce2a52513db8a40caa04a0
                                            • Instruction ID: 02552a34c76accac4399838a2441dfd12a28735add3dfd68cdb878b64044fab2
                                            • Opcode Fuzzy Hash: e517f1f3d29eea0e2abac41e83982ecc7ef006b46fce2a52513db8a40caa04a0
                                            • Instruction Fuzzy Hash: CC81D5F0204054BAF629663D8E79EBB2D5DFBA2300B14051BF542C7795CA9E8F46D23A
                                            APIs
                                              • Part of subcall function 005539AB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 005539D7
                                              • Part of subcall function 005539AB: _wcslen.LIBCMT ref: 005539F8
                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 005521BA
                                            • WSAGetLastError.WSOCK32 ref: 005521E1
                                            • bind.WSOCK32(00000000,?,00000010), ref: 00552238
                                            • WSAGetLastError.WSOCK32 ref: 00552243
                                            • closesocket.WSOCK32(00000000), ref: 00552272
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                            • String ID:
                                            • API String ID: 1601658205-0
                                            • Opcode ID: 85080ef4dae872062cf1915b5a342b3002f6730b61acdae3bdbeaefc4e75568f
                                            • Instruction ID: 5c9ba650f0d45dac5270328b128ba329c905d52bcbdb5cbcc93b275b7ffcfa7b
                                            • Opcode Fuzzy Hash: 85080ef4dae872062cf1915b5a342b3002f6730b61acdae3bdbeaefc4e75568f
                                            • Instruction Fuzzy Hash: 3151D375A002009FD710AF25C8AAF2A7BA5AB55718F14844EF9169F3D3C674ED41CBE1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                            • String ID:
                                            • API String ID: 292994002-0
                                            • Opcode ID: 10468fa8da8ed4402f8cb36f515baeff93f0eff7f6af886624aa4ccf961fafb5
                                            • Instruction ID: 4cc0f16261965253f46d730f48318bc039ec7f2d140d93c7c678fdff89b03c63
                                            • Opcode Fuzzy Hash: 10468fa8da8ed4402f8cb36f515baeff93f0eff7f6af886624aa4ccf961fafb5
                                            • Instruction Fuzzy Hash: 4F21E2317006018FD7209F1AC858B5A7FA5FFA4324F19846DE88ACB351DB71EC42DBA0
                                            APIs
                                            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0053EC19
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: mouse_event
                                            • String ID: DOWN
                                            • API String ID: 2434400541-711622031
                                            • Opcode ID: 0aad69190bc8b67a0df32f3ecfd8bf60b978f6e52011b9e2debb9041a2bbb3cf
                                            • Instruction ID: ba9d5738eceb9e27a344361c4f814d07029e8e619cabe30b784c7b12fc1ad790
                                            • Opcode Fuzzy Hash: 0aad69190bc8b67a0df32f3ecfd8bf60b978f6e52011b9e2debb9041a2bbb3cf
                                            • Instruction Fuzzy Hash: A3E0862619D72638BD4421197C03DF707CCEF22734B51014BF801D51C0EE841D826078
                                            APIs
                                            • DestroyWindow.USER32(00000000), ref: 0055309B
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 005531C7
                                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00553206
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00553216
                                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 0055325D
                                            • GetClientRect.USER32(00000000,?), ref: 00553269
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 005532B2
                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 005532C1
                                            • GetStockObject.GDI32(00000011), ref: 005532D1
                                            • SelectObject.GDI32(00000000,00000000), ref: 005532D5
                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 005532E5
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005532EE
                                            • DeleteDC.GDI32(00000000), ref: 005532F7
                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00553323
                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 0055333A
                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 0055337A
                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0055338E
                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 0055339F
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 005533D4
                                            • GetStockObject.GDI32(00000011), ref: 005533DF
                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 005533EA
                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 005533F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                            • API String ID: 2910397461-517079104
                                            • Opcode ID: 3fa5416c3364d6d35240a2d1808aabe87fff46b6fb73cf76080968db4778416d
                                            • Instruction ID: d0b60bc7a7b2bbaf51c8341bc28659c4dc6f301004b64ea1abddb8936d49c5e5
                                            • Opcode Fuzzy Hash: 3fa5416c3364d6d35240a2d1808aabe87fff46b6fb73cf76080968db4778416d
                                            • Instruction Fuzzy Hash: A4B180B1A00205AFEB14DF69CC5AFAE7BB9FB19710F00451AF915E7290C7B4AD04DBA4
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 00560C44
                                            • _wcslen.LIBCMT ref: 00560C7E
                                            • _wcslen.LIBCMT ref: 00560CE8
                                            • _wcslen.LIBCMT ref: 00560D50
                                            • _wcslen.LIBCMT ref: 00560DD4
                                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00560E24
                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00560E63
                                              • Part of subcall function 004EFD60: _wcslen.LIBCMT ref: 004EFD6B
                                              • Part of subcall function 00532ACF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00532AE8
                                              • Part of subcall function 00532ACF: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00532B1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _wcslen$MessageSend$BuffCharUpper
                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                            • API String ID: 1103490817-719923060
                                            • Opcode ID: b3a9e7d7eb00b56173dd6e711e212de918a25b30706765be2d853eb27886b9d7
                                            • Instruction ID: 361b616ff094d8260a8382551f2e5ec6a5c26c2b4943ad9d8c71842ef2755e40
                                            • Opcode Fuzzy Hash: b3a9e7d7eb00b56173dd6e711e212de918a25b30706765be2d853eb27886b9d7
                                            • Instruction Fuzzy Hash: A5E19D312046418FCB14EF29C85183BBBE6FF99318B148A5EF8969B3A1DB34ED45CB51
                                            APIs
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004D259A
                                            • GetSystemMetrics.USER32(00000007), ref: 004D25A2
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004D25CD
                                            • GetSystemMetrics.USER32(00000008), ref: 004D25D5
                                            • GetSystemMetrics.USER32(00000004), ref: 004D25FA
                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 004D2617
                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 004D2627
                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 004D265A
                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 004D266E
                                            • GetClientRect.USER32(00000000,000000FF), ref: 004D268C
                                            • GetStockObject.GDI32(00000011), ref: 004D26A8
                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 004D26B3
                                              • Part of subcall function 004D19CD: GetCursorPos.USER32(?), ref: 004D19E1
                                              • Part of subcall function 004D19CD: ScreenToClient.USER32(00000000,?), ref: 004D19FE
                                              • Part of subcall function 004D19CD: GetAsyncKeyState.USER32(00000001), ref: 004D1A23
                                              • Part of subcall function 004D19CD: GetAsyncKeyState.USER32(00000002), ref: 004D1A3D
                                            • SetTimer.USER32(00000000,00000000,00000028,004D199C), ref: 004D26DA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                            • String ID: AutoIt v3 GUI
                                            • API String ID: 1458621304-248962490
                                            • Opcode ID: c052463dc6935530ed86a681d60a3e2034509446b477d07308e88f48db6cb558
                                            • Instruction ID: a241b6ec42fd1ca1bbf86c39fa288d7b66daa1cb26dbecb89ca8c44ec8b5562a
                                            • Opcode Fuzzy Hash: c052463dc6935530ed86a681d60a3e2034509446b477d07308e88f48db6cb558
                                            • Instruction Fuzzy Hash: E8B1CC71A0020AAFDB04DFA8CD65BEE3BB0FB58314F00422AFA05A7290D7B4D945DF65
                                            APIs
                                            • _wcslen.LIBCMT ref: 00568CB9
                                            • _wcslen.LIBCMT ref: 00568CCD
                                            • _wcslen.LIBCMT ref: 00568CF0
                                            • _wcslen.LIBCMT ref: 00568D13
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00568D51
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00566551), ref: 00568DAD
                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00568DE6
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00568E29
                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00568E60
                                            • FreeLibrary.KERNEL32(?), ref: 00568E6C
                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00568E7C
                                            • DestroyIcon.USER32(?,?,?,?,?,00566551), ref: 00568E8B
                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00568EA8
                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00568EB4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                            • String ID: .dll$.exe$.icl$QeV
                                            • API String ID: 799131459-3279563497
                                            • Opcode ID: c21d14d90bafd7a8794341fff8ee9a4ee68a422a061bb20a062871dfef0fac57
                                            • Instruction ID: 7dd0c51b19839bdf196c3afaf89a2faf6bdb9ce6181fce93796dedb02c27ffce
                                            • Opcode Fuzzy Hash: c21d14d90bafd7a8794341fff8ee9a4ee68a422a061bb20a062871dfef0fac57
                                            • Instruction Fuzzy Hash: F761ADB1A00619BAEB149B64CC41BBE7BBCBB18714F10460AF915DB1D0DFB59D84DBA0
                                            APIs
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0055CE1C
                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0056DCD0,00000000,?,00000000,?,?), ref: 0055CEA3
                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0055CF03
                                            • _wcslen.LIBCMT ref: 0055CF53
                                            • _wcslen.LIBCMT ref: 0055CFCE
                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0055D011
                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0055D120
                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0055D1AC
                                            • RegCloseKey.ADVAPI32(?), ref: 0055D1E0
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0055D1ED
                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0055D2BF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                            • API String ID: 9721498-966354055
                                            • Opcode ID: 2d9ad276a758a4529bf6c88570536fd747a8100716d9342d70a7eced27a2ed65
                                            • Instruction ID: 97d97b360149d2882c38f4d9ac0bfd204c9151614df75d19a6998c5b1918e940
                                            • Opcode Fuzzy Hash: 2d9ad276a758a4529bf6c88570536fd747a8100716d9342d70a7eced27a2ed65
                                            • Instruction Fuzzy Hash: 70129C352046019FC714DF15C8A5A2ABBF5FF88318F04885EF88A9B3A2DB35ED45CB95
                                            APIs
                                            • CharLowerBuffW.USER32(?,?), ref: 00544852
                                            • _wcslen.LIBCMT ref: 0054485D
                                            • _wcslen.LIBCMT ref: 005448B4
                                            • _wcslen.LIBCMT ref: 005448F2
                                            • GetDriveTypeW.KERNEL32(?), ref: 00544930
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00544978
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005449B3
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005449E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: SendString_wcslen$BuffCharDriveLowerType
                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                            • API String ID: 1839972693-4113822522
                                            • Opcode ID: fe7b3bf09c4959ac193c2e2212e4bb95ec96b6326ae511bc7df4faf063eb6a0f
                                            • Instruction ID: b89cc741cd7e777755e28f995ca46e5e45290a10b6667beb0e9c26b91555864e
                                            • Opcode Fuzzy Hash: fe7b3bf09c4959ac193c2e2212e4bb95ec96b6326ae511bc7df4faf063eb6a0f
                                            • Instruction Fuzzy Hash: 9271D0326442069FC710EF25C890AABBBE5FFA8758F00492EF89697351EB34DD45CB91
                                            APIs
                                            • LoadIconW.USER32(00000063), ref: 005362BD
                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005362CF
                                            • SetWindowTextW.USER32(?,?), ref: 005362E6
                                            • GetDlgItem.USER32(?,000003EA), ref: 005362FB
                                            • SetWindowTextW.USER32(00000000,?), ref: 00536301
                                            • GetDlgItem.USER32(?,000003E9), ref: 00536311
                                            • SetWindowTextW.USER32(00000000,?), ref: 00536317
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00536338
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00536352
                                            • GetWindowRect.USER32(?,?), ref: 0053635B
                                            • _wcslen.LIBCMT ref: 005363C2
                                            • SetWindowTextW.USER32(?,?), ref: 005363FE
                                            • GetDesktopWindow.USER32 ref: 00536404
                                            • GetWindowRect.USER32(00000000), ref: 0053640B
                                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00536462
                                            • GetClientRect.USER32(?,?), ref: 0053646F
                                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 00536494
                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 005364BE
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                            • String ID:
                                            • API String ID: 895679908-0
                                            • Opcode ID: 2e58733c49ddb4c51309eafc4b51271386a27b23d4c061bcc4e806b1e60eb996
                                            • Instruction ID: 8526eb497e30dd333fca2aac1dd76f81b46c93623088c41943b0cc65f04b1bdf
                                            • Opcode Fuzzy Hash: 2e58733c49ddb4c51309eafc4b51271386a27b23d4c061bcc4e806b1e60eb996
                                            • Instruction Fuzzy Hash: 57716C31A00705AFDB20DFA8CE85AAEBBF5FF48705F10491CE546A71A0D7B5E944DB60
                                            APIs
                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00550784
                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 0055078F
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0055079A
                                            • LoadCursorW.USER32(00000000,00007F03), ref: 005507A5
                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 005507B0
                                            • LoadCursorW.USER32(00000000,00007F01), ref: 005507BB
                                            • LoadCursorW.USER32(00000000,00007F81), ref: 005507C6
                                            • LoadCursorW.USER32(00000000,00007F88), ref: 005507D1
                                            • LoadCursorW.USER32(00000000,00007F80), ref: 005507DC
                                            • LoadCursorW.USER32(00000000,00007F86), ref: 005507E7
                                            • LoadCursorW.USER32(00000000,00007F83), ref: 005507F2
                                            • LoadCursorW.USER32(00000000,00007F85), ref: 005507FD
                                            • LoadCursorW.USER32(00000000,00007F82), ref: 00550808
                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00550813
                                            • LoadCursorW.USER32(00000000,00007F04), ref: 0055081E
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00550829
                                            • GetCursorInfo.USER32(?), ref: 00550839
                                            • GetLastError.KERNEL32 ref: 0055087B
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Cursor$Load$ErrorInfoLast
                                            • String ID:
                                            • API String ID: 3215588206-0
                                            • Opcode ID: 59841a408bd8988cca1750a152bb408177093a6a3cc72208ff483a452e2bf2ed
                                            • Instruction ID: 59375a7fec0998cd28ad2a22a5d13334692c9d1692e627b960ba0317b118c15b
                                            • Opcode Fuzzy Hash: 59841a408bd8988cca1750a152bb408177093a6a3cc72208ff483a452e2bf2ed
                                            • Instruction Fuzzy Hash: 6E414570E083196ADB10DFBA8C89C5EBFE8FF04754B50452AE51CEB291DA78E905CF91
                                            APIs
                                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 004F0456
                                              • Part of subcall function 004F047D: InitializeCriticalSectionAndSpinCount.KERNEL32(005A170C,00000FA0,2AE8C1DE,?,?,?,?,00512753,000000FF), ref: 004F04AC
                                              • Part of subcall function 004F047D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00512753,000000FF), ref: 004F04B7
                                              • Part of subcall function 004F047D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00512753,000000FF), ref: 004F04C8
                                              • Part of subcall function 004F047D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 004F04DE
                                              • Part of subcall function 004F047D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 004F04EC
                                              • Part of subcall function 004F047D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 004F04FA
                                              • Part of subcall function 004F047D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004F0525
                                              • Part of subcall function 004F047D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004F0530
                                            • ___scrt_fastfail.LIBCMT ref: 004F0477
                                              • Part of subcall function 004F0433: __onexit.LIBCMT ref: 004F0439
                                            Strings
                                            • WakeAllConditionVariable, xrefs: 004F04F2
                                            • InitializeConditionVariable, xrefs: 004F04D8
                                            • SleepConditionVariableCS, xrefs: 004F04E4
                                            • kernel32.dll, xrefs: 004F04C3
                                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 004F04B2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                            • API String ID: 66158676-1714406822
                                            • Opcode ID: 57e38bd6be8028e6d758d53985ae5b823f1854d59972d45700f8bd5847c94a7d
                                            • Instruction ID: bfb81c04fded0507ab03b027bc5a2b951c2a6389a0d0d866bf344720a101342a
                                            • Opcode Fuzzy Hash: 57e38bd6be8028e6d758d53985ae5b823f1854d59972d45700f8bd5847c94a7d
                                            • Instruction Fuzzy Hash: 05212C32B40714BBD7106BA9AC05B3A37E5EB95BA5F00551BFA05973C1DFF88C04DA68
                                            APIs
                                            • CharLowerBuffW.USER32(00000000,00000000,0056DCD0), ref: 00544E81
                                            • _wcslen.LIBCMT ref: 00544E95
                                            • _wcslen.LIBCMT ref: 00544EF3
                                            • _wcslen.LIBCMT ref: 00544F4E
                                            • _wcslen.LIBCMT ref: 00544F99
                                            • _wcslen.LIBCMT ref: 00545001
                                              • Part of subcall function 004EFD60: _wcslen.LIBCMT ref: 004EFD6B
                                            • GetDriveTypeW.KERNEL32(?,00597C10,00000061), ref: 0054509D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _wcslen$BuffCharDriveLowerType
                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                            • API String ID: 2055661098-1000479233
                                            • Opcode ID: 255feb5aa91e64383695e45ac169f7410c47ee47267bfa8e0a37501e8d25ffdd
                                            • Instruction ID: de5104842d55254e2ac4e1f9d8f27845f294e866e5a8ee8741e3d4e028097f9b
                                            • Opcode Fuzzy Hash: 255feb5aa91e64383695e45ac169f7410c47ee47267bfa8e0a37501e8d25ffdd
                                            • Instruction Fuzzy Hash: 1CB1E5356083029FC710DF29C894ABABBE5BFA4718F50491EF59687392EB34D845CB92
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,0056DCD0), ref: 00554A18
                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00554A2A
                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0056DCD0), ref: 00554A4F
                                            • FreeLibrary.KERNEL32(00000000,?,0056DCD0), ref: 00554A9B
                                            • StringFromGUID2.OLE32(?,?,00000028,?,0056DCD0), ref: 00554B05
                                            • SysFreeString.OLEAUT32(00000009), ref: 00554BBF
                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00554C25
                                            • SysFreeString.OLEAUT32(?), ref: 00554C4F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                            • String ID: GetModuleHandleExW$kernel32.dll
                                            • API String ID: 354098117-199464113
                                            • Opcode ID: 84536dfaa563c26207e6772d76e12fd0d9933899b4baf5b89743f94af7e7686d
                                            • Instruction ID: 02392e669e895cea245f566b811a893fd96b4a278bc82d233a80a31bf3c4e8a5
                                            • Opcode Fuzzy Hash: 84536dfaa563c26207e6772d76e12fd0d9933899b4baf5b89743f94af7e7686d
                                            • Instruction Fuzzy Hash: C4127D71A00105EFCB14CF94C898EAEBBB9FF45319F148099E905AB251D771ED8ACFA0
                                            APIs
                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0054CE0D
                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0054CE20
                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0054CE34
                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0054CE4D
                                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0054CE90
                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0054CEA6
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0054CEB1
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0054CEE1
                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0054CF39
                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0054CF4D
                                            • InternetCloseHandle.WININET(00000000), ref: 0054CF58
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                            • String ID:
                                            • API String ID: 3800310941-3916222277
                                            • Opcode ID: 7fc97b5aa97b66246a2a23095d46079cad76bf0d5477ddbe46773e0a269d9c53
                                            • Instruction ID: 0f8e20cc979245d056305430ce063722c165d741972db8d7a197b555627c80b7
                                            • Opcode Fuzzy Hash: 7fc97b5aa97b66246a2a23095d46079cad76bf0d5477ddbe46773e0a269d9c53
                                            • Instruction Fuzzy Hash: 83518D70601208BFDB619F64CC88AAA7FFDFF58748F004819F94597210D778D908ABA0
                                            APIs
                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00568EF1
                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00568F01
                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00568F0C
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00568F19
                                            • GlobalLock.KERNEL32(00000000), ref: 00568F27
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00568F36
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00568F3F
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00568F46
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00568F57
                                            • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00570C04,?), ref: 00568F70
                                            • GlobalFree.KERNEL32(00000000), ref: 00568F80
                                            • GetObjectW.GDI32(?,00000018,?), ref: 00568FA0
                                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00568FD0
                                            • DeleteObject.GDI32(?), ref: 00568FF8
                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0056900E
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                            • String ID:
                                            • API String ID: 3840717409-0
                                            • Opcode ID: 4ba8ab91a9f8df319b76c388e100e37b3bbe030cc6ed7af5c47671c1fe40af2b
                                            • Instruction ID: 34430c866451828663753d61ab9e8bc8030ec23e681cb51a14bf12434bc1dfbc
                                            • Opcode Fuzzy Hash: 4ba8ab91a9f8df319b76c388e100e37b3bbe030cc6ed7af5c47671c1fe40af2b
                                            • Instruction Fuzzy Hash: 93412875A00204AFDB21DF69CC88EAABBB9FF99711F104558F906D7260DBB0AD45DB20
                                            APIs
                                            • GetDC.USER32(00000000), ref: 00552F35
                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00552F45
                                            • CreateCompatibleDC.GDI32(?), ref: 00552F51
                                            • SelectObject.GDI32(00000000,?), ref: 00552F5E
                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00552FCA
                                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00553009
                                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 0055302D
                                            • SelectObject.GDI32(?,?), ref: 00553035
                                            • DeleteObject.GDI32(?), ref: 0055303E
                                            • DeleteDC.GDI32(?), ref: 00553045
                                            • ReleaseDC.USER32(00000000,?), ref: 00553050
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                            • String ID: (
                                            • API String ID: 2598888154-3887548279
                                            • Opcode ID: 989085663031aa7f67aff52b3e3c661c48ff49bda2e411538be0047703b1db4f
                                            • Instruction ID: 751dfb692747322c20cb9e2f357006bc7338fb6cbb540396de90e6ce36e4c68a
                                            • Opcode Fuzzy Hash: 989085663031aa7f67aff52b3e3c661c48ff49bda2e411538be0047703b1db4f
                                            • Instruction Fuzzy Hash: 9C610571E00219EFCF14CFA8D885AAEBBB5FF48310F20851AE955A7250D771A945DF60
                                            APIs
                                            • GetMenuItemInfoW.USER32(005A2990,000000FF,00000000,00000030), ref: 0053C888
                                            • SetMenuItemInfoW.USER32(005A2990,00000004,00000000,00000030), ref: 0053C8BD
                                            • Sleep.KERNEL32(000001F4), ref: 0053C8CF
                                            • GetMenuItemCount.USER32(?), ref: 0053C915
                                            • GetMenuItemID.USER32(?,00000000), ref: 0053C932
                                            • GetMenuItemID.USER32(?,-00000001), ref: 0053C95E
                                            • GetMenuItemID.USER32(?,?), ref: 0053C9A5
                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0053C9EB
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0053CA00
                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0053CA21
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$CheckCountRadioSleep
                                            • String ID: 0
                                            • API String ID: 1460738036-4108050209
                                            • Opcode ID: 42e03803a12ca1b0d3ae6996a6a65a98f5986768331445becafea3b3113ea9d8
                                            • Instruction ID: 2c038671d54660fd6c9815684e27fd7b69dc61489a6c691dac3840e59e763bd8
                                            • Opcode Fuzzy Hash: 42e03803a12ca1b0d3ae6996a6a65a98f5986768331445becafea3b3113ea9d8
                                            • Instruction Fuzzy Hash: 91617B71A0024AAFDF11CF68C888ABEBFB8FB55308F004559E842B3291D774AD45DB60
                                            APIs
                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0053E3E9
                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0053E40F
                                            • _wcslen.LIBCMT ref: 0053E419
                                            • _wcsstr.LIBVCRUNTIME ref: 0053E469
                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0053E485
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                            • API String ID: 1939486746-1459072770
                                            • Opcode ID: 40e1227a3c1bcdab289d21fb4318061a702ae8101ee008e5414fd68efef59d21
                                            • Instruction ID: 849438037965f1a7498562002963d98982e34ffcc99a7c2de957e69539054649
                                            • Opcode Fuzzy Hash: 40e1227a3c1bcdab289d21fb4318061a702ae8101ee008e5414fd68efef59d21
                                            • Instruction Fuzzy Hash: 99410E72A4020C7AEB05A7658D47FBF3BBCEF59714F00045BFA00A71C2EB78990196B9
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0054469A
                                            • _wcslen.LIBCMT ref: 005446C7
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 005446F7
                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00544718
                                            • RemoveDirectoryW.KERNEL32(?), ref: 00544728
                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 005447AF
                                            • CloseHandle.KERNEL32(00000000), ref: 005447BA
                                            • CloseHandle.KERNEL32(00000000), ref: 005447C5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                            • String ID: :$\$\??\%s
                                            • API String ID: 1149970189-3457252023
                                            • Opcode ID: 9624b863a8a6632f0372a72229b229f7acf173a0e7ad8e74ce27fa383c8e6db3
                                            • Instruction ID: 8267f05c39c736c82518f4e62be0a9ac8760d5199bc9f76bb8fdf7c35cfb69f8
                                            • Opcode Fuzzy Hash: 9624b863a8a6632f0372a72229b229f7acf173a0e7ad8e74ce27fa383c8e6db3
                                            • Instruction Fuzzy Hash: 5831E375A40249ABDB209F64DC44FEB37BCFF89744F1000AAF605D2160EBB496858F34
                                            APIs
                                            • timeGetTime.WINMM ref: 0053EEE0
                                              • Part of subcall function 004EF27E: timeGetTime.WINMM(?,?,0053EF00), ref: 004EF282
                                            • Sleep.KERNEL32(0000000A), ref: 0053EF0D
                                            • EnumThreadWindows.USER32(?,Function_0006EE91,00000000), ref: 0053EF31
                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0053EF53
                                            • SetActiveWindow.USER32 ref: 0053EF72
                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0053EF80
                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0053EF9F
                                            • Sleep.KERNEL32(000000FA), ref: 0053EFAA
                                            • IsWindow.USER32 ref: 0053EFB6
                                            • EndDialog.USER32(00000000), ref: 0053EFC7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                            • String ID: BUTTON
                                            • API String ID: 1194449130-3405671355
                                            • Opcode ID: 4590a0994149312a1b173e63f41e47df24a322b850832144a4e77df58a15e373
                                            • Instruction ID: ecfcb0c186c363c9313eb8d89051d629165e137ac2af5bc4635b82122b0958ab
                                            • Opcode Fuzzy Hash: 4590a0994149312a1b173e63f41e47df24a322b850832144a4e77df58a15e373
                                            • Instruction Fuzzy Hash: 25215074640205BFEF016F64EC8AA267FEAFB66748F100815F511932A1CBF59D08BA75
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 0053A8EE
                                            • SetKeyboardState.USER32(?), ref: 0053A959
                                            • GetAsyncKeyState.USER32(000000A0), ref: 0053A979
                                            • GetKeyState.USER32(000000A0), ref: 0053A990
                                            • GetAsyncKeyState.USER32(000000A1), ref: 0053A9BF
                                            • GetKeyState.USER32(000000A1), ref: 0053A9D0
                                            • GetAsyncKeyState.USER32(00000011), ref: 0053A9FC
                                            • GetKeyState.USER32(00000011), ref: 0053AA0A
                                            • GetAsyncKeyState.USER32(00000012), ref: 0053AA33
                                            • GetKeyState.USER32(00000012), ref: 0053AA41
                                            • GetAsyncKeyState.USER32(0000005B), ref: 0053AA6A
                                            • GetKeyState.USER32(0000005B), ref: 0053AA78
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: cf250539504854160f922cf63171a0d921e4c775af0a641b3a7037a05eb259a3
                                            • Instruction ID: b388117765e2a6a063446793f65454c4f86177ba695aaeebc3f8dfb08f8976c7
                                            • Opcode Fuzzy Hash: cf250539504854160f922cf63171a0d921e4c775af0a641b3a7037a05eb259a3
                                            • Instruction Fuzzy Hash: EF51E731A0478969FB35EBB089157EAFFB4AF12340F48859EC5C25B1C3DA549A4CCB63
                                            APIs
                                            • GetDlgItem.USER32(?,00000001), ref: 00536571
                                            • GetWindowRect.USER32(00000000,?), ref: 0053658A
                                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 005365E8
                                            • GetDlgItem.USER32(?,00000002), ref: 005365F8
                                            • GetWindowRect.USER32(00000000,?), ref: 0053660A
                                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 0053665E
                                            • GetDlgItem.USER32(?,000003E9), ref: 0053666C
                                            • GetWindowRect.USER32(00000000,?), ref: 0053667E
                                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 005366C0
                                            • GetDlgItem.USER32(?,000003EA), ref: 005366D3
                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 005366E9
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 005366F6
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$ItemMoveRect$Invalidate
                                            • String ID:
                                            • API String ID: 3096461208-0
                                            • Opcode ID: 5c9ab882e35d48e6c5ab2b4367fb93d28f9d9b10491699d0c89b5b306b54ac13
                                            • Instruction ID: c4cf617d60786cfdc2378ed1cab5c7430eebc4ad5922174895bb37dcba419ac5
                                            • Opcode Fuzzy Hash: 5c9ab882e35d48e6c5ab2b4367fb93d28f9d9b10491699d0c89b5b306b54ac13
                                            • Instruction Fuzzy Hash: 5F510CB1F00205AFDB18CF69DD99AAEBBB5FB58300F10852DF919E7290D7B09D048B60
                                            APIs
                                              • Part of subcall function 004D21E4: GetWindowLongW.USER32(?,000000EB), ref: 004D21F2
                                            • GetSysColor.USER32(0000000F), ref: 004D2102
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ColorLongWindow
                                            • String ID:
                                            • API String ID: 259745315-0
                                            • Opcode ID: 6c8bda557b471614c7fb4df279f72b1235d0fe21950ef46312e9b717034d7b20
                                            • Instruction ID: 45468132f40a46c948d6f71fbb5f18f80be62e538caff6260e31fd5d7cb78b36
                                            • Opcode Fuzzy Hash: 6c8bda557b471614c7fb4df279f72b1235d0fe21950ef46312e9b717034d7b20
                                            • Instruction Fuzzy Hash: 7D41B331600650AFDB205F38DC54BBE3B75AB62721F148617FAA2873E1C7B58D42DB25
                                            APIs
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00531032
                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0053104E
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0053106A
                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00531094
                                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 005310BC
                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005310C7
                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005310CC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                            • API String ID: 323675364-22481851
                                            • Opcode ID: 48ee8fc280dd80fa3b92ee7a560245229067ee9824cc4a5ef6f4457d40faed70
                                            • Instruction ID: 78fbb06c57012c237f5b10fc3df221efe6e266953f8c2d15c903f6ae8b33276b
                                            • Opcode Fuzzy Hash: 48ee8fc280dd80fa3b92ee7a560245229067ee9824cc4a5ef6f4457d40faed70
                                            • Instruction Fuzzy Hash: 7C412C72D10229ABCF11EBA5DC959EDBBB8FF14314F01442AF901A7260EB749D48CBA4
                                            APIs
                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0056499A
                                            • CreateCompatibleDC.GDI32(00000000), ref: 005649A1
                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 005649B4
                                            • SelectObject.GDI32(00000000,00000000), ref: 005649BC
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 005649C7
                                            • DeleteDC.GDI32(00000000), ref: 005649D1
                                            • GetWindowLongW.USER32(?,000000EC), ref: 005649DB
                                            • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 005649F1
                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 005649FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                            • String ID: static
                                            • API String ID: 2559357485-2160076837
                                            • Opcode ID: 0ce2be16fa818b10ad9243c34667805bb710a745cb39a5e0afbac908270ddc94
                                            • Instruction ID: 5bad97d10bc70890c22fe1e88132e47a663463578f6db6849b60933fd8e3c9f3
                                            • Opcode Fuzzy Hash: 0ce2be16fa818b10ad9243c34667805bb710a745cb39a5e0afbac908270ddc94
                                            • Instruction Fuzzy Hash: 94315A32640219ABDF119FA8CC09FEA3FA9FF19724F100611FA55A71A0D7B5D814EBA4
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 005545B9
                                            • CoInitialize.OLE32(00000000), ref: 005545E7
                                            • CoUninitialize.OLE32 ref: 005545F1
                                            • _wcslen.LIBCMT ref: 0055468A
                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 0055470E
                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00554832
                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 0055486B
                                            • CoGetObject.OLE32(?,00000000,00570B64,?), ref: 0055488A
                                            • SetErrorMode.KERNEL32(00000000), ref: 0055489D
                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00554921
                                            • VariantClear.OLEAUT32(?), ref: 00554935
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                            • String ID:
                                            • API String ID: 429561992-0
                                            • Opcode ID: 213f859873d5bd3e155d0efe7e6306f90178cec7ef66d4873b433977b7d8612e
                                            • Instruction ID: 95475d5bd0d092c11e663369b1a303524acd0617fd876bd556b17aa3dd1629f8
                                            • Opcode Fuzzy Hash: 213f859873d5bd3e155d0efe7e6306f90178cec7ef66d4873b433977b7d8612e
                                            • Instruction Fuzzy Hash: FBC146B1604305AFC700DF68C89492BBBE9FF89749F14491EF9899B250DB70ED4ACB52
                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 0054844D
                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 005484E9
                                            • SHGetDesktopFolder.SHELL32(?), ref: 005484FD
                                            • CoCreateInstance.OLE32(00570CD4,00000000,00000001,00597E8C,?), ref: 00548549
                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 005485CE
                                            • CoTaskMemFree.OLE32(?,?), ref: 00548626
                                            • SHBrowseForFolderW.SHELL32(?), ref: 005486B1
                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 005486D4
                                            • CoTaskMemFree.OLE32(00000000), ref: 005486DB
                                            • CoTaskMemFree.OLE32(00000000), ref: 00548730
                                            • CoUninitialize.OLE32 ref: 00548736
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                            • String ID:
                                            • API String ID: 2762341140-0
                                            • Opcode ID: f3cb90fff9ae3178a80914bfee9696b8aea5959f6b3aef890aebc9ee946f7283
                                            • Instruction ID: 761c250df0595e4a0c4dbec18f98d1852fdf0718a40bec21bcc8e2c1404d91ef
                                            • Opcode Fuzzy Hash: f3cb90fff9ae3178a80914bfee9696b8aea5959f6b3aef890aebc9ee946f7283
                                            • Instruction Fuzzy Hash: F2C12B75A00109AFCB14DFA4C898DAEBBF9FF48308B158499E419EB361CB31ED45CB50
                                            APIs
                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0053033F
                                            • SafeArrayAllocData.OLEAUT32(?), ref: 00530398
                                            • VariantInit.OLEAUT32(?), ref: 005303AA
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 005303CA
                                            • VariantCopy.OLEAUT32(?,?), ref: 0053041D
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00530431
                                            • VariantClear.OLEAUT32(?), ref: 00530446
                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00530453
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0053045C
                                            • VariantClear.OLEAUT32(?), ref: 0053046E
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00530479
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                            • String ID:
                                            • API String ID: 2706829360-0
                                            • Opcode ID: aabcf9ecb866552fca3926cda9beee71832e50d2fa42aebbcadb15c3aa113af0
                                            • Instruction ID: ec44e1b86c4ab5d6ef065b575e601a6164c331f98f087f23b777bbc420d2e18d
                                            • Opcode Fuzzy Hash: aabcf9ecb866552fca3926cda9beee71832e50d2fa42aebbcadb15c3aa113af0
                                            • Instruction Fuzzy Hash: E4418034E002199FCF00DF69C8589AEBFB9FF58345F008429E955A7261CBB0EE45DBA0
                                            APIs
                                              • Part of subcall function 004D2441: GetWindowLongW.USER32(00000000,000000EB), ref: 004D2452
                                            • GetSystemMetrics.USER32(0000000F), ref: 0056A926
                                            • GetSystemMetrics.USER32(0000000F), ref: 0056A946
                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0056AB83
                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0056ABA1
                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0056ABC2
                                            • ShowWindow.USER32(00000003,00000000), ref: 0056ABE1
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0056AC06
                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 0056AC29
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                            • String ID:
                                            • API String ID: 1211466189-3916222277
                                            • Opcode ID: 88e8346188e56286f2392215885772d95c3a9d103f06ce4c3846bde3d6b7e3e7
                                            • Instruction ID: d7af46af8b9b456e754a89b853586c4ec3e99e095d460989aa65d574a14b7b88
                                            • Opcode Fuzzy Hash: 88e8346188e56286f2392215885772d95c3a9d103f06ce4c3846bde3d6b7e3e7
                                            • Instruction Fuzzy Hash: 6EB189316002199FDF14CF68C9857AE7BB2FF84701F18806AED45AB2A5D770A984CF62
                                            APIs
                                            • WSAStartup.WSOCK32(00000101,?), ref: 00550F19
                                            • inet_addr.WSOCK32(?), ref: 00550F79
                                            • gethostbyname.WSOCK32(?), ref: 00550F85
                                            • IcmpCreateFile.IPHLPAPI ref: 00550F93
                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00551023
                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00551042
                                            • IcmpCloseHandle.IPHLPAPI(?), ref: 00551116
                                            • WSACleanup.WSOCK32 ref: 0055111C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                            • String ID: Ping
                                            • API String ID: 1028309954-2246546115
                                            • Opcode ID: 12496b79662b3d7f5e1d2d69af2ec1c304ef077c5479d463f87066560f0fcf1e
                                            • Instruction ID: b7ff5dc1947516ea5e977671743204b5a14d01eb89651ea07134901c07026443
                                            • Opcode Fuzzy Hash: 12496b79662b3d7f5e1d2d69af2ec1c304ef077c5479d463f87066560f0fcf1e
                                            • Instruction Fuzzy Hash: 3D91D0316046419FD320DF15C899B16BFE0FF44318F14899AF8698B7A2C775EC89CB91
                                            APIs
                                            • GetLocalTime.KERNEL32(?), ref: 00548BB1
                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00548BC1
                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00548BCD
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00548C6A
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00548C7E
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00548CB0
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00548CE6
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00548CEF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CurrentDirectoryTime$File$Local$System
                                            • String ID: *.*
                                            • API String ID: 1464919966-438819550
                                            • Opcode ID: 60f1027da4cb376c5db0f2c5e55ee7c39a6c3c3409a8e10c38f89d6b3215445a
                                            • Instruction ID: 290c2a1b2e6005d5b9e09da2680db8f6b94f77bf584da58fbfc1f08254f7538a
                                            • Opcode Fuzzy Hash: 60f1027da4cb376c5db0f2c5e55ee7c39a6c3c3409a8e10c38f89d6b3215445a
                                            • Instruction Fuzzy Hash: 81616AB26043059FC710EF21C8959AEB7E8FF99318F04881EF98987251DB35E945CB96
                                            APIs
                                            • CreateMenu.USER32 ref: 005645D8
                                            • SetMenu.USER32(?,00000000), ref: 005645E7
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0056466F
                                            • IsMenu.USER32(?), ref: 00564683
                                            • CreatePopupMenu.USER32 ref: 0056468D
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005646BA
                                            • DrawMenuBar.USER32 ref: 005646C2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                            • String ID: 0$F
                                            • API String ID: 161812096-3044882817
                                            • Opcode ID: 6c7e130dc4f44947cf813904518bdf65dd534357ffee8661f72cec276f1c561f
                                            • Instruction ID: ba2517f1634e92a46324baf376d34ed862853285c35b1a8fcc35d20073a967dc
                                            • Opcode Fuzzy Hash: 6c7e130dc4f44947cf813904518bdf65dd534357ffee8661f72cec276f1c561f
                                            • Instruction Fuzzy Hash: 5241A974A01209EFDF14CF68D894AEA7BB5FF1A314F040429FA46A7360C770A924DF60
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 00534536: GetClassNameW.USER32(?,?,000000FF), ref: 00534559
                                            • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 005327F4
                                            • GetDlgCtrlID.USER32 ref: 005327FF
                                            • GetParent.USER32 ref: 0053281B
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0053281E
                                            • GetDlgCtrlID.USER32(?), ref: 00532827
                                            • GetParent.USER32(?), ref: 0053283B
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0053283E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 711023334-1403004172
                                            • Opcode ID: c11924c91591f6e1dfc52defd7e04dfe3d91c971521bbaa5866e593b0cecfbc0
                                            • Instruction ID: 7a305c804dbc34d4024e66e98279788838483d183066a3443b57b7a2b957a684
                                            • Opcode Fuzzy Hash: c11924c91591f6e1dfc52defd7e04dfe3d91c971521bbaa5866e593b0cecfbc0
                                            • Instruction Fuzzy Hash: DC21D370E00114FBCF00ABA4DC95AEEBFB5FF15310F004556F951932A1CB785808DB60
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 00534536: GetClassNameW.USER32(?,?,000000FF), ref: 00534559
                                            • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 005328D3
                                            • GetDlgCtrlID.USER32 ref: 005328DE
                                            • GetParent.USER32 ref: 005328FA
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 005328FD
                                            • GetDlgCtrlID.USER32(?), ref: 00532906
                                            • GetParent.USER32(?), ref: 0053291A
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0053291D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 711023334-1403004172
                                            • Opcode ID: dde0cbea3a55a2c352e9a1c1468e92fb96aa4eb2464e4d22152562fd1d0e11c2
                                            • Instruction ID: 84ba2a83e9b4a1ff23b5314efc123294aedbfeae5e0a75035c37b5ebaaaa0352
                                            • Opcode Fuzzy Hash: dde0cbea3a55a2c352e9a1c1468e92fb96aa4eb2464e4d22152562fd1d0e11c2
                                            • Instruction Fuzzy Hash: 9521BE75E00218BBCF11ABA4DC89AEEBFB9FF14300F004556F951A32A5DB785848DB60
                                            APIs
                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 005643FC
                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 005643FF
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00564426
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00564449
                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 005644C1
                                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 0056450B
                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00564526
                                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00564541
                                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00564555
                                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00564572
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow
                                            • String ID:
                                            • API String ID: 312131281-0
                                            • Opcode ID: 18cc8cd1b83c15af3e3eb7f6a2e50822d5507c8dfaf64c5399bdc1b07e052e00
                                            • Instruction ID: 544311c3fc27014a2c9915337993c3446d955f9642caf0dd879943dbd6d40194
                                            • Opcode Fuzzy Hash: 18cc8cd1b83c15af3e3eb7f6a2e50822d5507c8dfaf64c5399bdc1b07e052e00
                                            • Instruction Fuzzy Hash: D4618A75A00208AFDB11CFA8CC81EEE7BB8FF59710F104169FA15A72A1C774AA85DF50
                                            APIs
                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0054CBCF
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0054CBF7
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0054CC27
                                            • GetLastError.KERNEL32 ref: 0054CC7F
                                            • SetEvent.KERNEL32(?), ref: 0054CC93
                                            • InternetCloseHandle.WININET(00000000), ref: 0054CC9E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                            • String ID:
                                            • API String ID: 3113390036-3916222277
                                            • Opcode ID: 14f2b5d40131f6392ee26a9430c31bfb84137224e7b8b281f4d0c68b95178028
                                            • Instruction ID: dd61ec1e0c6b54c9db5d3361594504777f492f22a94bdee17557b0bd2a58aae1
                                            • Opcode Fuzzy Hash: 14f2b5d40131f6392ee26a9430c31bfb84137224e7b8b281f4d0c68b95178028
                                            • Instruction Fuzzy Hash: 9D318BB1A01205AFD7619F65CD88AAB7FFCFB99748B10091EE45AD7200DB34DD089B71
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00515437,?,?,Bad directive syntax error,0056DCD0,00000000,00000010,?,?), ref: 0053A14B
                                            • LoadStringW.USER32(00000000,?,00515437,?), ref: 0053A152
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0053A216
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: HandleLoadMessageModuleString_wcslen
                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                            • API String ID: 858772685-4153970271
                                            • Opcode ID: 9f8ef2aa637c028442078af44758239bfe5335882b1abaa55a2ab28e28749992
                                            • Instruction ID: 871f4ba85bbbca0a30f39b7dd51f35af5b82b042d748d6638c26c9f3d9d85be3
                                            • Opcode Fuzzy Hash: 9f8ef2aa637c028442078af44758239bfe5335882b1abaa55a2ab28e28749992
                                            • Instruction Fuzzy Hash: 73219E3290021EEBCF01AF90CC1AEEE7B75BF18308F04485BF515661A2DB75AA58DB51
                                            APIs
                                            • GetParent.USER32 ref: 0053293B
                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00532950
                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 005329DD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameParentSend
                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                            • API String ID: 1290815626-3381328864
                                            • Opcode ID: 5b9d31a2cde4f1e32a81957a4a49b645a6e63906dd616682724cc590c8203d8c
                                            • Instruction ID: 694b54cb262268c646deb7366e7378d922f07d8355519284027bdd121fe403fe
                                            • Opcode Fuzzy Hash: 5b9d31a2cde4f1e32a81957a4a49b645a6e63906dd616682724cc590c8203d8c
                                            • Instruction Fuzzy Hash: 9311A37764470ABAFA002625EC07EF67FEDAF15724F200117FA00E50D1FFA558855554
                                            APIs
                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0054CADF
                                            • GetLastError.KERNEL32 ref: 0054CAF2
                                            • SetEvent.KERNEL32(?), ref: 0054CB06
                                              • Part of subcall function 0054CBB0: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0054CBCF
                                              • Part of subcall function 0054CBB0: GetLastError.KERNEL32 ref: 0054CC7F
                                              • Part of subcall function 0054CBB0: SetEvent.KERNEL32(?), ref: 0054CC93
                                              • Part of subcall function 0054CBB0: InternetCloseHandle.WININET(00000000), ref: 0054CC9E
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                            • String ID:
                                            • API String ID: 337547030-0
                                            • Opcode ID: e8f28047f40e56ecf1eaba8ba3224e6ecdd3001c242b93f8db6e248da2f6427b
                                            • Instruction ID: 5036f754fff794dc5425a6b1c7059e2b740d49eff04330726428dcda7ef08bc0
                                            • Opcode Fuzzy Hash: e8f28047f40e56ecf1eaba8ba3224e6ecdd3001c242b93f8db6e248da2f6427b
                                            • Instruction Fuzzy Hash: 6D31AC71602705AFDB619F65CD49AB6BFF8FF98308B40481DF85687610D771E814ABA0
                                            APIs
                                              • Part of subcall function 005342CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 005342E6
                                              • Part of subcall function 005342CC: GetCurrentThreadId.KERNEL32 ref: 005342ED
                                              • Part of subcall function 005342CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00532E43), ref: 005342F4
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00532E4D
                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00532E6B
                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00532E6F
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00532E79
                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00532E91
                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00532E95
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00532E9F
                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00532EB3
                                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00532EB7
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                            • String ID:
                                            • API String ID: 2014098862-0
                                            • Opcode ID: 5ab77b6a973083fcbec0f94561f315ca7d37119dfdbd7c0fafb1bc8ebd90a42a
                                            • Instruction ID: 875d959da563f991624c67770a5a24a03767b2a9272f9b6e1b2f494574a6fa28
                                            • Opcode Fuzzy Hash: 5ab77b6a973083fcbec0f94561f315ca7d37119dfdbd7c0fafb1bc8ebd90a42a
                                            • Instruction Fuzzy Hash: 2901B5317806157BFB106769DC8AF563F69EB9AB11F100401F318AF1E0C9F12444DA79
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00531CD9,?,?,00000000), ref: 0053209C
                                            • HeapAlloc.KERNEL32(00000000,?,00531CD9,?,?,00000000), ref: 005320A3
                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00531CD9,?,?,00000000), ref: 005320B8
                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00531CD9,?,?,00000000), ref: 005320C0
                                            • DuplicateHandle.KERNEL32(00000000,?,00531CD9,?,?,00000000), ref: 005320C3
                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00531CD9,?,?,00000000), ref: 005320D3
                                            • GetCurrentProcess.KERNEL32(00531CD9,00000000,?,00531CD9,?,?,00000000), ref: 005320DB
                                            • DuplicateHandle.KERNEL32(00000000,?,00531CD9,?,?,00000000), ref: 005320DE
                                            • CreateThread.KERNEL32(00000000,00000000,00532104,00000000,00000000,00000000), ref: 005320F8
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                            • String ID:
                                            • API String ID: 1957940570-0
                                            • Opcode ID: 235689befc8edd547d2328f281436def90fd7b04b9949dd6c38eba5346e11a39
                                            • Instruction ID: a0412183c176238f577018dcb7975ee29e9d6b863ff55aee44a104759f31e20f
                                            • Opcode Fuzzy Hash: 235689befc8edd547d2328f281436def90fd7b04b9949dd6c38eba5346e11a39
                                            • Instruction Fuzzy Hash: 3401BBB5740348BFE710ABA9DC4DF6B3BACEB99711F004811FA05DB2A1CAB19844DB31
                                            APIs
                                              • Part of subcall function 0053DC9C: CreateToolhelp32Snapshot.KERNEL32 ref: 0053DCC1
                                              • Part of subcall function 0053DC9C: Process32FirstW.KERNEL32(00000000,?), ref: 0053DCCF
                                              • Part of subcall function 0053DC9C: CloseHandle.KERNELBASE(00000000), ref: 0053DD9C
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0055AACC
                                            • GetLastError.KERNEL32 ref: 0055AADF
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0055AB12
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0055ABC7
                                            • GetLastError.KERNEL32(00000000), ref: 0055ABD2
                                            • CloseHandle.KERNEL32(00000000), ref: 0055AC23
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                            • String ID: SeDebugPrivilege
                                            • API String ID: 2533919879-2896544425
                                            • Opcode ID: 1ce789078fad6a6cabc8c64dc8792346a751240124a71570027cd7664cd7341e
                                            • Instruction ID: 62151ad57ed1069bacdd8e7921e4bb28abbc65dddb756f470522cf1674eaf686
                                            • Opcode Fuzzy Hash: 1ce789078fad6a6cabc8c64dc8792346a751240124a71570027cd7664cd7341e
                                            • Instruction Fuzzy Hash: C3618E302042429FD710DF19C4A8F16BBE1BF54319F14899EE8664F7A2C7B5ED49CB92
                                            APIs
                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00564284
                                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00564299
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 005642B3
                                            • _wcslen.LIBCMT ref: 005642F8
                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00564325
                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00564353
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window_wcslen
                                            • String ID: SysListView32
                                            • API String ID: 2147712094-78025650
                                            • Opcode ID: be481df06ea34821d35479e44afbd768b97dca919fe97129484f3e6b3f7fdc15
                                            • Instruction ID: c63aefaaab74ccf7a459c2a3e4cf6aa96b36e8ec54a7cb873bbc33cc9bce52d8
                                            • Opcode Fuzzy Hash: be481df06ea34821d35479e44afbd768b97dca919fe97129484f3e6b3f7fdc15
                                            • Instruction Fuzzy Hash: 2341BF31A00309ABDF219F64CC49BEA7BA9FF48360F10052AF954E7291D7749994CFA0
                                            APIs
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0053C5D9
                                            • IsMenu.USER32(00000000), ref: 0053C5F9
                                            • CreatePopupMenu.USER32 ref: 0053C62F
                                            • GetMenuItemCount.USER32(01805AA8), ref: 0053C680
                                            • InsertMenuItemW.USER32(01805AA8,?,00000001,00000030), ref: 0053C6A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                            • String ID: 0$2
                                            • API String ID: 93392585-3793063076
                                            • Opcode ID: cd3784258d54e73342bde603ee0c52c4b74d1dac2625e8cb29153f26e3a61b5d
                                            • Instruction ID: bf0ce0b784d4df2c67d2dc6c8fb7b1bbfafb63a867aeb5074040629fb35e6f35
                                            • Opcode Fuzzy Hash: cd3784258d54e73342bde603ee0c52c4b74d1dac2625e8cb29153f26e3a61b5d
                                            • Instruction Fuzzy Hash: 3651E271A00305ABDF20CF6CC98ABAEBFF4BF59314F149529E801BB2A1D7709944CB21
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                            • String ID: 0.0.0.0
                                            • API String ID: 642191829-3771769585
                                            • Opcode ID: 2b1c63d301dd4de3c24baba5516bfe53ede451b9f211b1c2e2afcb8183d36cba
                                            • Instruction ID: 8828242230ccd1aef4b4a2f1598c820b27d04cb6ec2bd211a45c0eb310150d3a
                                            • Opcode Fuzzy Hash: 2b1c63d301dd4de3c24baba5516bfe53ede451b9f211b1c2e2afcb8183d36cba
                                            • Instruction Fuzzy Hash: 40113A71D002096BDB2067359C4BEEE7BBCEF50310F10006AF541930D1EFB48A85AB60
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit
                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                            • API String ID: 2610073882-625585964
                                            • Opcode ID: f99527a18416e9917b40d0c7b91c4958598565857902369fd22397e50b32a9d7
                                            • Instruction ID: 583bdf2ef1c67468eedd9aadd4f0e4a099c7c67c9cb4afb8f62aeb49bf65f1d6
                                            • Opcode Fuzzy Hash: f99527a18416e9917b40d0c7b91c4958598565857902369fd22397e50b32a9d7
                                            • Instruction Fuzzy Hash: 9891A571A00615ABDF20CF95C868FAE7FB8FF45315F10855AF905AB290D7709949CFA0
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 005542C8
                                            • CharUpperBuffW.USER32(?,?), ref: 005543D7
                                            • _wcslen.LIBCMT ref: 005543E7
                                            • VariantClear.OLEAUT32(?), ref: 0055457C
                                              • Part of subcall function 005415B3: VariantInit.OLEAUT32(00000000), ref: 005415F3
                                              • Part of subcall function 005415B3: VariantCopy.OLEAUT32(?,?), ref: 005415FC
                                              • Part of subcall function 005415B3: VariantClear.OLEAUT32(?), ref: 00541608
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                            • API String ID: 4137639002-1221869570
                                            • Opcode ID: b16eb07f6a3866f796c7d8797482b3dd5f6595642559bb5a3605191bfca144f2
                                            • Instruction ID: 92e939ef1ac8c2aaa82116910a4024b063fa6d1c9b7973393af2e99510a5d6db
                                            • Opcode Fuzzy Hash: b16eb07f6a3866f796c7d8797482b3dd5f6595642559bb5a3605191bfca144f2
                                            • Instruction Fuzzy Hash: 539137746083419FCB00DF69C49596ABBE5BF88319F14882EF88987351DB34ED49CF92
                                            APIs
                                            • GetMenu.USER32(?), ref: 00562AE2
                                            • GetMenuItemCount.USER32(00000000), ref: 00562B14
                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00562B3C
                                            • _wcslen.LIBCMT ref: 00562B72
                                            • GetMenuItemID.USER32(?,?), ref: 00562BAC
                                            • GetSubMenu.USER32(?,?), ref: 00562BBA
                                              • Part of subcall function 005342CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 005342E6
                                              • Part of subcall function 005342CC: GetCurrentThreadId.KERNEL32 ref: 005342ED
                                              • Part of subcall function 005342CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00532E43), ref: 005342F4
                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00562C42
                                              • Part of subcall function 0053F1A7: Sleep.KERNEL32 ref: 0053F21F
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                            • String ID:
                                            • API String ID: 4196846111-0
                                            • Opcode ID: cb3e167648f43756f414edd2c834d4d7fd3f5977821499a3603aae8649ca53f3
                                            • Instruction ID: 0e8e25f209efd2625dbc4b43eda78e5da5403948457f2adf158382450d7f7a9e
                                            • Opcode Fuzzy Hash: cb3e167648f43756f414edd2c834d4d7fd3f5977821499a3603aae8649ca53f3
                                            • Instruction Fuzzy Hash: C8719075A00605AFDB10EF65C845AAEBBF1FF98314F108859E816EB351DB74ED418F90
                                            APIs
                                            • IsWindow.USER32(00000000), ref: 00568896
                                            • IsWindowEnabled.USER32(00000000), ref: 005688A2
                                            • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0056897D
                                            • SendMessageW.USER32(00000000,000000B0,?,?), ref: 005689B0
                                            • IsDlgButtonChecked.USER32(?,00000000), ref: 005689E8
                                            • GetWindowLongW.USER32(00000000,000000EC), ref: 00568A0A
                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00568A22
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                            • String ID:
                                            • API String ID: 4072528602-0
                                            • Opcode ID: bc9e5a997ee45c70b362c9acf3c7255440d71ac5e4d427169a8700c27716821c
                                            • Instruction ID: e7ed84752e2c288a96bfa5853071d6659e6e5e9cc789802f006b75e4c7260b04
                                            • Opcode Fuzzy Hash: bc9e5a997ee45c70b362c9acf3c7255440d71ac5e4d427169a8700c27716821c
                                            • Instruction Fuzzy Hash: F371EF34A00205AFEF218F55C894FBA7FB9FF5A300F140A59F84593261CB71AD84DB12
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005380D1
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005380F7
                                            • SysAllocString.OLEAUT32(00000000), ref: 005380FA
                                            • SysAllocString.OLEAUT32 ref: 0053811B
                                            • SysFreeString.OLEAUT32 ref: 00538124
                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 0053813E
                                            • SysAllocString.OLEAUT32(?), ref: 0053814C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                            • String ID:
                                            • API String ID: 3761583154-0
                                            • Opcode ID: e2a4075479bd26831047ccf924c0c7e28b4be8bf1f5e39ba602a14d3f5453b7c
                                            • Instruction ID: b4eea33d31f311dca404185c7f87f3a7deba2e0c273020c28cb4f33aa4c4bd93
                                            • Opcode Fuzzy Hash: e2a4075479bd26831047ccf924c0c7e28b4be8bf1f5e39ba602a14d3f5453b7c
                                            • Instruction Fuzzy Hash: 29218671600204AFDF149FADDC88CBA7BECFB59360B008525F905CB2A1DAB4EC89D764
                                            APIs
                                            • GetStdHandle.KERNEL32(0000000C), ref: 00540DAE
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00540DEA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CreateHandlePipe
                                            • String ID: nul
                                            • API String ID: 1424370930-2873401336
                                            • Opcode ID: 71ff9519a0b5cc5ed38aea33e5f7ffe28b7903a0b941d4a4796d58d40c9ac20d
                                            • Instruction ID: 4b708cf7080d549c646825ef9296f4ce937d6a160acf26f41cb88b6691786fbb
                                            • Opcode Fuzzy Hash: 71ff9519a0b5cc5ed38aea33e5f7ffe28b7903a0b941d4a4796d58d40c9ac20d
                                            • Instruction Fuzzy Hash: 35215E74A00305EFDB208F69D804ADABFB8BF55728F305E19EAA1D72D0D7709864DB60
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F6), ref: 00540E82
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00540EBD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CreateHandlePipe
                                            • String ID: nul
                                            • API String ID: 1424370930-2873401336
                                            • Opcode ID: 03d59dab4bf0035c05b333e2f7cd0e37f20200f34a606ab3f38662e677fc83b4
                                            • Instruction ID: 784aa2f830f1700a19fd445db93d933a643595a633998463798b7c14342f6718
                                            • Opcode Fuzzy Hash: 03d59dab4bf0035c05b333e2f7cd0e37f20200f34a606ab3f38662e677fc83b4
                                            • Instruction Fuzzy Hash: CE217175604305ABDB249F289C04ADABBB8FF55728F301E2DFAA1D32D0D7719854CB60
                                            APIs
                                              • Part of subcall function 004D771B: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004D7759
                                              • Part of subcall function 004D771B: GetStockObject.GDI32(00000011), ref: 004D776D
                                              • Part of subcall function 004D771B: SendMessageW.USER32(00000000,00000030,00000000), ref: 004D7777
                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00564A71
                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00564A7E
                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00564A89
                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00564A98
                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00564AA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$CreateObjectStockWindow
                                            • String ID: Msctls_Progress32
                                            • API String ID: 1025951953-3636473452
                                            • Opcode ID: c0c6d49ea5d0eb568cc8652e0df4854360e1d95969b151663aa4d55b7d7e2fe9
                                            • Instruction ID: 4ccea0e3b3b84100074a9d9c68361d02a860e8c1f29e30c0a62076d8609fcd85
                                            • Opcode Fuzzy Hash: c0c6d49ea5d0eb568cc8652e0df4854360e1d95969b151663aa4d55b7d7e2fe9
                                            • Instruction Fuzzy Hash: 461163B1150219BEEF119EA4CC85EE77F9DFF09758F014111BA14A7150C6759C21DBA4
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0053E23D
                                            • LoadStringW.USER32(00000000), ref: 0053E244
                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0053E25A
                                            • LoadStringW.USER32(00000000), ref: 0053E261
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0053E2A5
                                            Strings
                                            • %s (%d) : ==> %s: %s %s, xrefs: 0053E282
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString$Message
                                            • String ID: %s (%d) : ==> %s: %s %s
                                            • API String ID: 4072794657-3128320259
                                            • Opcode ID: c5f1c73db870a5bdab0fd302298d243033f70c47b724a955d64fca3f5cc5f2da
                                            • Instruction ID: de6e1c33c430fda287de5f07345d1fbc7bf0880a7f9287571afbf6d77a136795
                                            • Opcode Fuzzy Hash: c5f1c73db870a5bdab0fd302298d243033f70c47b724a955d64fca3f5cc5f2da
                                            • Instruction Fuzzy Hash: B30112F6A002087FE7119794DD8AEE77B7CE708300F404991F746E3041EAB49E889B71
                                            APIs
                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 0055271D
                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0055273E
                                            • WSAGetLastError.WSOCK32 ref: 0055274F
                                            • htons.WSOCK32(?,?,?,?,?), ref: 00552838
                                            • inet_ntoa.WSOCK32(?), ref: 005527E9
                                              • Part of subcall function 00534277: _strlen.LIBCMT ref: 00534281
                                              • Part of subcall function 00553B81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0054F569), ref: 00553B9D
                                            • _strlen.LIBCMT ref: 00552892
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                            • String ID:
                                            • API String ID: 3203458085-0
                                            • Opcode ID: 4bc0b58bdf4070bfa39610d80d99b21d162dcda60ab207719a50950611a7555e
                                            • Instruction ID: 8969673be8d1f858e1e30e9ec80c1c8cc14be9876d87fd06d58d9a40dee5d865
                                            • Opcode Fuzzy Hash: 4bc0b58bdf4070bfa39610d80d99b21d162dcda60ab207719a50950611a7555e
                                            • Instruction Fuzzy Hash: B4B1F231604301AFD310DF25C8A5E2A7BB5BF89318F54894EF8564B3A2DB35ED49CB91
                                            APIs
                                            • __allrem.LIBCMT ref: 0050044A
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00500466
                                            • __allrem.LIBCMT ref: 0050047D
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0050049B
                                            • __allrem.LIBCMT ref: 005004B2
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005004D0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                            • String ID:
                                            • API String ID: 1992179935-0
                                            • Opcode ID: 2c635347f6fb7bc080f97231395b1708db1b00bed18cf3e190c3431c6bc10d53
                                            • Instruction ID: 43b9373d2a2e4e5174d16f802aa52ad7e566c10366afeb3a98c87bd0fdece373
                                            • Opcode Fuzzy Hash: 2c635347f6fb7bc080f97231395b1708db1b00bed18cf3e190c3431c6bc10d53
                                            • Instruction Fuzzy Hash: E3811B726007069BEB259E6DCC86BAF7BE8BF80324F24552EF611D72C1E770D9408B54
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,004F8669,004F8669,?,?,?,005067DF,00000001,00000001,8BE85006), ref: 005065E8
                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,005067DF,00000001,00000001,8BE85006,?,?,?), ref: 0050666E
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00506768
                                            • __freea.LIBCMT ref: 00506775
                                              • Part of subcall function 00503BB0: RtlAllocateHeap.NTDLL(00000000,?,?,?,004F6A99,?,0000015D,?,?,?,?,004F85D0,000000FF,00000000,?,?), ref: 00503BE2
                                            • __freea.LIBCMT ref: 0050677E
                                            • __freea.LIBCMT ref: 005067A3
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                            • String ID:
                                            • API String ID: 1414292761-0
                                            • Opcode ID: 8332a2b185c5ef6bc3d255bf462f14dc6b7717edcd0caf0c1f982b551a56c9bf
                                            • Instruction ID: 5829bdf50eb57be0e969d82fdd0e11ab470ca29a4d5a8dfe1aa6f1727a7b8b14
                                            • Opcode Fuzzy Hash: 8332a2b185c5ef6bc3d255bf462f14dc6b7717edcd0caf0c1f982b551a56c9bf
                                            • Instruction Fuzzy Hash: DE51CF72600216AFEB258F64CD86EAF7FA9FF84754F144628F804D6180EB74DD64C6A1
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 0055D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0055C00D,?,?), ref: 0055D314
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D350
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D3C7
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D3FD
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0055C629
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0055C684
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0055C6C9
                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0055C6F8
                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0055C752
                                            • RegCloseKey.ADVAPI32(?), ref: 0055C75E
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                            • String ID:
                                            • API String ID: 1120388591-0
                                            • Opcode ID: a347f9b025153c34713d3d29138fc97736747075303061be3bacf77b025a3e97
                                            • Instruction ID: 585f02eb37b59c411954fa58a1dae21c128cbcdd527af52a5c98862cda2ad143
                                            • Opcode Fuzzy Hash: a347f9b025153c34713d3d29138fc97736747075303061be3bacf77b025a3e97
                                            • Instruction Fuzzy Hash: 8D816C71208341AFD714DF24C8A5E2ABBE5FF84308F14895EF5558B2A2DB31ED49CB91
                                            APIs
                                            • VariantInit.OLEAUT32(00000035), ref: 00530049
                                            • SysAllocString.OLEAUT32(00000000), ref: 005300F0
                                            • VariantCopy.OLEAUT32(005302F4,00000000), ref: 00530119
                                            • VariantClear.OLEAUT32(005302F4), ref: 0053013D
                                            • VariantCopy.OLEAUT32(005302F4,00000000), ref: 00530141
                                            • VariantClear.OLEAUT32(?), ref: 0053014B
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCopy$AllocInitString
                                            • String ID:
                                            • API String ID: 3859894641-0
                                            • Opcode ID: 248b718e04786a0a6a2df471c22a4f64b7aab3f7e49a8af6bf3ff6496a3bfc09
                                            • Instruction ID: a3c275f52f3343613c8d5f4832c6dd952092b7050be749557ce0fed1b802bbc4
                                            • Opcode Fuzzy Hash: 248b718e04786a0a6a2df471c22a4f64b7aab3f7e49a8af6bf3ff6496a3bfc09
                                            • Instruction Fuzzy Hash: 7B511635600310AACF20AB65D8A9B2ABBA4FF55310F14684BF901DF2D6DB748C44CB95
                                            APIs
                                            • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0052FB8F,00000000,?,?,00000000,?,005139BC,00000004,00000000,00000000), ref: 00568BAB
                                            • EnableWindow.USER32(?,00000000), ref: 00568BD1
                                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00568C30
                                            • ShowWindow.USER32(?,00000004), ref: 00568C44
                                            • EnableWindow.USER32(?,00000001), ref: 00568C6A
                                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00568C8E
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$Show$Enable$MessageSend
                                            • String ID:
                                            • API String ID: 642888154-0
                                            • Opcode ID: 36f1bfd093c354f70c845bfb037d790190326e13d9a9798fd625f6da722ffe2c
                                            • Instruction ID: b083b9c762fa419d751cd99055469a0d9508ba4aad4e2a7283988c958aba3711
                                            • Opcode Fuzzy Hash: 36f1bfd093c354f70c845bfb037d790190326e13d9a9798fd625f6da722ffe2c
                                            • Instruction Fuzzy Hash: 34416374601144EFDB25CF18C899BB57FF0FB56704F184269E9084F272CB71A885DB51
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,00000000), ref: 00552C45
                                              • Part of subcall function 0054EE49: GetWindowRect.USER32(?,?), ref: 0054EE61
                                            • GetDesktopWindow.USER32 ref: 00552C6F
                                            • GetWindowRect.USER32(00000000), ref: 00552C76
                                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00552CB2
                                            • GetCursorPos.USER32(?), ref: 00552CDE
                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00552D3C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                            • String ID:
                                            • API String ID: 2387181109-0
                                            • Opcode ID: 82a3e3ace3b341ba444b0b6ea3f1c705e76529d6f000042479416bd006b6d188
                                            • Instruction ID: 68a9791403941ec12134ef6506b3fc0ba59cf304b072d4996740a56bfdccffcb
                                            • Opcode Fuzzy Hash: 82a3e3ace3b341ba444b0b6ea3f1c705e76529d6f000042479416bd006b6d188
                                            • Instruction Fuzzy Hash: 6F31F472504316ABD720DF18D849B5F7BE9FFC5314F00091AF895A7181DB70E908CBA2
                                            APIs
                                              • Part of subcall function 004D557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004D5558,?,?,00514B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 004D559E
                                            • _wcslen.LIBCMT ref: 005461D5
                                            • CoInitialize.OLE32(00000000), ref: 005462EF
                                            • CoCreateInstance.OLE32(00570CC4,00000000,00000001,00570B34,?), ref: 00546308
                                            • CoUninitialize.OLE32 ref: 00546326
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                            • String ID: .lnk
                                            • API String ID: 3172280962-24824748
                                            • Opcode ID: 0384a762e5ee169b6ea82315db6529a8ab6f115fe3f8fb0287964d5c7a1830fb
                                            • Instruction ID: 0d1400395188b0683fd6c854a4b8004e0d655965d78e3332e4d2f566fa672634
                                            • Opcode Fuzzy Hash: 0384a762e5ee169b6ea82315db6529a8ab6f115fe3f8fb0287964d5c7a1830fb
                                            • Instruction Fuzzy Hash: 3ED165746082019FCB04DF25C494A6ABBF5FF8A318F04885EF8899B361CB71EC45CB92
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0053210F
                                            • UnloadUserProfile.USERENV(?,?), ref: 0053211B
                                            • CloseHandle.KERNEL32(?), ref: 00532124
                                            • CloseHandle.KERNEL32(?), ref: 0053212C
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00532135
                                            • HeapFree.KERNEL32(00000000), ref: 0053213C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                            • String ID:
                                            • API String ID: 146765662-0
                                            • Opcode ID: 405444eccca1ce7fbbb5dc7900d2f419456d9b09ddb6b98afeea92c7e59af394
                                            • Instruction ID: 768e22b4d323aa722b47a2d4f64c7f27cb2250fb6539db98073b1ed07f3b27bb
                                            • Opcode Fuzzy Hash: 405444eccca1ce7fbbb5dc7900d2f419456d9b09ddb6b98afeea92c7e59af394
                                            • Instruction Fuzzy Hash: 9AE0ED76A04141BBDB011FA9ED0C905BF39FF6D3227104A20F22583170CBB35464EB61
                                            APIs
                                              • Part of subcall function 004D4154: _wcslen.LIBCMT ref: 004D4159
                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0053CEAE
                                            • _wcslen.LIBCMT ref: 0053CEF5
                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0053CF5C
                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0053CF8A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info_wcslen$Default
                                            • String ID: 0
                                            • API String ID: 1227352736-4108050209
                                            • Opcode ID: 21449f5eb66d3a0975b17ec36fd3afc9199821e789773fef4e8c92de96bd8a67
                                            • Instruction ID: 43bfd9bca029e49d8396d0512cd801af684f13378dbfdae924aca9dbf7761580
                                            • Opcode Fuzzy Hash: 21449f5eb66d3a0975b17ec36fd3afc9199821e789773fef4e8c92de96bd8a67
                                            • Instruction Fuzzy Hash: 2E51EF716043009FD715DF28C885B6BBFE9BF99318F040A2EF995E72A0DB74C9449B52
                                            APIs
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00564794
                                            • IsMenu.USER32(?), ref: 005647A9
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005647F1
                                            • DrawMenuBar.USER32 ref: 00564804
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Menu$Item$DrawInfoInsert
                                            • String ID: 0
                                            • API String ID: 3076010158-4108050209
                                            • Opcode ID: 97e496909397019baa08cca1e65d658047b7c3b4e6edb3f2ce9214067750a1c8
                                            • Instruction ID: 6055425235dda777b02afefec46dea2dbec6d3ff5195e81f93ce4b905b1be452
                                            • Opcode Fuzzy Hash: 97e496909397019baa08cca1e65d658047b7c3b4e6edb3f2ce9214067750a1c8
                                            • Instruction Fuzzy Hash: 30415775A00249EFDB20CFA4D884EAABBB9FF0A314F044129E905A7350C770ED54DF60
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 00534536: GetClassNameW.USER32(?,?,000000FF), ref: 00534559
                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 005326F6
                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00532709
                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00532739
                                              • Part of subcall function 004D84B7: _wcslen.LIBCMT ref: 004D84CA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$_wcslen$ClassName
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 2081771294-1403004172
                                            • Opcode ID: 00569b1cbbc4f35f864beee656490c7480875e01c9d5de7ddbdd86eeb80f7811
                                            • Instruction ID: 5fedc5635133e9b679c739992865010c84e48e7427470b2f72a2688762e2480b
                                            • Opcode Fuzzy Hash: 00569b1cbbc4f35f864beee656490c7480875e01c9d5de7ddbdd86eeb80f7811
                                            • Instruction Fuzzy Hash: 3F213571A00108BFDB14ABA4DC8ADFEBBB9FF81354F10851EF411A32E1DB78490A9660
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,004D637F,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D633E
                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 004D6350
                                            • FreeLibrary.KERNEL32(00000000,?,?,004D637F,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D6362
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadProc
                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                            • API String ID: 145871493-3689287502
                                            • Opcode ID: ca754ed97a819adc81ca0c2f0d9632d6f39442385f5b6192ad63f56f13629bed
                                            • Instruction ID: 8e91527f0db207ba77c3a09e299c3c5d3d1095fa7cebe3137d06a6b188e6ebcd
                                            • Opcode Fuzzy Hash: ca754ed97a819adc81ca0c2f0d9632d6f39442385f5b6192ad63f56f13629bed
                                            • Instruction Fuzzy Hash: 6CE08632B01B2117D21117596C18A5B6628AF92B1270A0017FD00D3300DFF8CC05C4B4
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,005154C3,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D6304
                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 004D6316
                                            • FreeLibrary.KERNEL32(00000000,?,?,005154C3,?,?,004D60AA,?,00000001,?,?,00000000), ref: 004D6329
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadProc
                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                            • API String ID: 145871493-1355242751
                                            • Opcode ID: affee0e3a2f9b30301587bb9292997010d517b3227785ad26df8e6fc859651b9
                                            • Instruction ID: 58167ff18b3c8caa45c7ebceb4ea088f5b66cccd5dd3f175a7818efc5be4edf1
                                            • Opcode Fuzzy Hash: affee0e3a2f9b30301587bb9292997010d517b3227785ad26df8e6fc859651b9
                                            • Instruction Fuzzy Hash: FDD01235B5262197D6222729AC28D8F7E24EE8BB1134A0417FC00A732CCFF8CD05D5B4
                                            APIs
                                            • GetCurrentProcessId.KERNEL32 ref: 0055AD86
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0055AD94
                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0055ADC7
                                            • CloseHandle.KERNEL32(?), ref: 0055AF9C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                            • String ID:
                                            • API String ID: 3488606520-0
                                            • Opcode ID: 27bb93433ab282603db8a6c21144bdc1046eb9d6c582e4e263b18b7019ea898f
                                            • Instruction ID: 225938678079f60e57995c1bedfc0cc5b6b28082d6600bef307a9293a324e9a3
                                            • Opcode Fuzzy Hash: 27bb93433ab282603db8a6c21144bdc1046eb9d6c582e4e263b18b7019ea898f
                                            • Instruction Fuzzy Hash: C6A1E1B16003019FD720EF25C8A6B2ABBE1AF54714F14891EF959DB392DB74EC04CB86
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 0055D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0055C00D,?,?), ref: 0055D314
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D350
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D3C7
                                              • Part of subcall function 0055D2F7: _wcslen.LIBCMT ref: 0055D3FD
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0055C404
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0055C45F
                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0055C4C2
                                            • RegCloseKey.ADVAPI32(?,?), ref: 0055C505
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0055C512
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                            • String ID:
                                            • API String ID: 826366716-0
                                            • Opcode ID: db7e182c4c90d814da8c3a6928a7d8c61ef32e7d263327f22bd9ed963b51416c
                                            • Instruction ID: 4a23a35f76be390abf8c3a9e8f78e36a5f3a9317d3c696c52976b57c94505a80
                                            • Opcode Fuzzy Hash: db7e182c4c90d814da8c3a6928a7d8c61ef32e7d263327f22bd9ed963b51416c
                                            • Instruction Fuzzy Hash: 9B615F31208241EFD714DF54C4A4E2ABBE5FF84309F14899EF4958B292DB35ED49CB91
                                            APIs
                                              • Part of subcall function 0053E60C: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0053D6E2,?), ref: 0053E629
                                              • Part of subcall function 0053E60C: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0053D6E2,?), ref: 0053E642
                                              • Part of subcall function 0053E9C5: GetFileAttributesW.KERNELBASE(?,0053D755), ref: 0053E9C6
                                            • lstrcmpiW.KERNEL32(?,?), ref: 0053EC9F
                                            • MoveFileW.KERNEL32(?,?), ref: 0053ECD8
                                            • _wcslen.LIBCMT ref: 0053EE17
                                            • _wcslen.LIBCMT ref: 0053EE2F
                                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0053EE7C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                            • String ID:
                                            • API String ID: 3183298772-0
                                            • Opcode ID: c26854d5ac9cb20b3b9547b2140ceb63e9cfffb32c671d7a05150c81303e6d5d
                                            • Instruction ID: 9bb946de282c1d8e4d002cb06a44065418f22bc6bd459a47d57f0ebe10562eb2
                                            • Opcode Fuzzy Hash: c26854d5ac9cb20b3b9547b2140ceb63e9cfffb32c671d7a05150c81303e6d5d
                                            • Instruction Fuzzy Hash: 8C5165B24083899BC724EB64D8859DF77ECBF84314F00092FF68593191EF74A688876A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: 39caef53fb1789228c98401363cc1b368e228e5da327740a0d5974f55e21d5cd
                                            • Instruction ID: 9b79344f3e420ef47abb60621474431773f87f089d463b91009e4cab796b2c34
                                            • Opcode Fuzzy Hash: 39caef53fb1789228c98401363cc1b368e228e5da327740a0d5974f55e21d5cd
                                            • Instruction Fuzzy Hash: 0A41E432A002049FCB20DF78C989A6EBBF5FF89314F1545A9E515EB291D631ED01DB41
                                            APIs
                                            • GetInputState.USER32 ref: 00544225
                                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 0054427C
                                            • TranslateMessage.USER32(?), ref: 005442A5
                                            • DispatchMessageW.USER32(?), ref: 005442AF
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005442C0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                            • String ID:
                                            • API String ID: 2256411358-0
                                            • Opcode ID: 4fdb5d7423104635ac82ce851643a25fec9b054beec180989bbe99a417b56fd1
                                            • Instruction ID: a0ade8a2f3d271e1f3af7bf2be3dbf238846569b038ae1cecb5ad0698440f053
                                            • Opcode Fuzzy Hash: 4fdb5d7423104635ac82ce851643a25fec9b054beec180989bbe99a417b56fd1
                                            • Instruction Fuzzy Hash: 933198749843429FEB24CB689809BF77FE8FB2670DF04496DE56282190D7E49489DF21
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 005321A5
                                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 00532251
                                            • Sleep.KERNEL32(00000000,?,?,?), ref: 00532259
                                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 0053226A
                                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00532272
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessagePostSleep$RectWindow
                                            • String ID:
                                            • API String ID: 3382505437-0
                                            • Opcode ID: 850de1c1896bc09a05b3805cdbfed716d3289f880bb9237bb6668f32b36fb8a7
                                            • Instruction ID: c6557b91bf5ce62b6e7b60717829296a357705c999d19ccf3f1669bbc043c863
                                            • Opcode Fuzzy Hash: 850de1c1896bc09a05b3805cdbfed716d3289f880bb9237bb6668f32b36fb8a7
                                            • Instruction Fuzzy Hash: 4131B175A00619EFDB04CFA8CD89ADE3FB5FB14315F104625FA25AB2D0C7B0A954DBA0
                                            APIs
                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 005660A4
                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 005660FC
                                            • _wcslen.LIBCMT ref: 0056610E
                                            • _wcslen.LIBCMT ref: 00566119
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00566175
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$_wcslen
                                            • String ID:
                                            • API String ID: 763830540-0
                                            • Opcode ID: 16af0fa964da36e0bb4bf08a7a939321e183225e9a9402ec57b7af3a731f2247
                                            • Instruction ID: 84bb195c9630d6cfc78f5c6daa769f764b223d71a949de790634c888c929b102
                                            • Opcode Fuzzy Hash: 16af0fa964da36e0bb4bf08a7a939321e183225e9a9402ec57b7af3a731f2247
                                            • Instruction Fuzzy Hash: AC219375900208ABDF109FA5CC88AEE7FB8FB45724F104616FA25DB2C0DB748685CF61
                                            APIs
                                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,005307D1,80070057,?,?,?,00530BEE), ref: 005308BB
                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005307D1,80070057,?,?), ref: 005308D6
                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005307D1,80070057,?,?), ref: 005308E4
                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005307D1,80070057,?), ref: 005308F4
                                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005307D1,80070057,?,?), ref: 00530900
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                            • String ID:
                                            • API String ID: 3897988419-0
                                            • Opcode ID: 7ffac841060eb4540304e725e2895cf516fe49e8988ba3c74ab7ea3123e93ea0
                                            • Instruction ID: e8ef85eb3667ab34e889ec4cdeef95aba6a3f603c54766d35e709cefee814d90
                                            • Opcode Fuzzy Hash: 7ffac841060eb4540304e725e2895cf516fe49e8988ba3c74ab7ea3123e93ea0
                                            • Instruction Fuzzy Hash: 52017C72B00318ABDB104F69DC08BAA7FBDFB98751F104524F905D3251D7B0DD00ABA0
                                            APIs
                                            • CloseHandle.KERNEL32(?,?,?,?,00540A39,?,00543C56,?,00000001,00513ACE,?), ref: 00540BE0
                                            • CloseHandle.KERNEL32(?,?,?,?,00540A39,?,00543C56,?,00000001,00513ACE,?), ref: 00540BED
                                            • CloseHandle.KERNEL32(?,?,?,?,00540A39,?,00543C56,?,00000001,00513ACE,?), ref: 00540BFA
                                            • CloseHandle.KERNEL32(?,?,?,?,00540A39,?,00543C56,?,00000001,00513ACE,?), ref: 00540C07
                                            • CloseHandle.KERNEL32(?,?,?,?,00540A39,?,00543C56,?,00000001,00513ACE,?), ref: 00540C14
                                            • CloseHandle.KERNEL32(?,?,?,?,00540A39,?,00543C56,?,00000001,00513ACE,?), ref: 00540C21
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID:
                                            • API String ID: 2962429428-0
                                            • Opcode ID: 39b39354dfe29232c13f47999c0d5a4544344f022adb0737f7e9f7f8bca817a0
                                            • Instruction ID: 6efae21e887ee3130cb248265271f9503050bd6f9433c70f5bed0f4faba36b82
                                            • Opcode Fuzzy Hash: 39b39354dfe29232c13f47999c0d5a4544344f022adb0737f7e9f7f8bca817a0
                                            • Instruction Fuzzy Hash: F301E271800B15CFC730AF66D880846FBF5FF503093209A3ED29242971C7B1A888DF80
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 005364E7
                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 005364FE
                                            • MessageBeep.USER32(00000000), ref: 00536516
                                            • KillTimer.USER32(?,0000040A), ref: 00536532
                                            • EndDialog.USER32(?,00000001), ref: 0053654C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                            • String ID:
                                            • API String ID: 3741023627-0
                                            • Opcode ID: e8bd28a2c27b22fcdda788b2a013887734637f4bfdf34f1e47aa064ffc2dac5c
                                            • Instruction ID: 3e8bc34d1a37c7c4da99da022382af3c7fe3db8f825dac0a6a443e033d8f6ec7
                                            • Opcode Fuzzy Hash: e8bd28a2c27b22fcdda788b2a013887734637f4bfdf34f1e47aa064ffc2dac5c
                                            • Instruction Fuzzy Hash: 2C018630A40704ABEB205B18DD4EB967B78FB20705F40496DF687620E1DBF4AA58DB60
                                            APIs
                                            • _free.LIBCMT ref: 0050264E
                                              • Part of subcall function 00502D58: RtlFreeHeap.NTDLL(00000000,00000000,?,0050DB71,005A1DC4,00000000,005A1DC4,00000000,?,0050DB98,005A1DC4,00000007,005A1DC4,?,0050DF95,005A1DC4), ref: 00502D6E
                                              • Part of subcall function 00502D58: GetLastError.KERNEL32(005A1DC4,?,0050DB71,005A1DC4,00000000,005A1DC4,00000000,?,0050DB98,005A1DC4,00000007,005A1DC4,?,0050DF95,005A1DC4,005A1DC4), ref: 00502D80
                                            • _free.LIBCMT ref: 00502660
                                            • _free.LIBCMT ref: 00502673
                                            • _free.LIBCMT ref: 00502684
                                            • _free.LIBCMT ref: 00502695
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 349246000ce8f29294510109ea6bffb6bde79faff5e1a2f78bcfa6d3f68a3255
                                            • Instruction ID: 01f0ce0abbedf1defea70e81d4951e828121133e8a3f89dad83f4e11c6bcbbed
                                            • Opcode Fuzzy Hash: 349246000ce8f29294510109ea6bffb6bde79faff5e1a2f78bcfa6d3f68a3255
                                            • Instruction Fuzzy Hash: 32F017758115618FCB01AF68AC0A94C3FA4BB76751B01020BF414922F5CB710D5BBEA8
                                            APIs
                                              • Part of subcall function 004F05D2: EnterCriticalSection.KERNEL32(005A170C,?,00000000,?,004DD1DA,005A3540,00000001,00000000,?,?,0054EF39,?,?,00000000,00000001,?), ref: 004F05DD
                                              • Part of subcall function 004F05D2: LeaveCriticalSection.KERNEL32(005A170C,?,004DD1DA,005A3540,00000001,00000000,?,?,0054EF39,?,?,00000000,00000001,?,00000001,005A2430), ref: 004F061A
                                              • Part of subcall function 004F0433: __onexit.LIBCMT ref: 004F0439
                                            • __Init_thread_footer.LIBCMT ref: 00556B95
                                              • Part of subcall function 004F0588: EnterCriticalSection.KERNEL32(005A170C,00000000,?,004DD208,005A3540,005127E9,00000001,00000000,?,?,0054EF39,?,?,00000000,00000001,?), ref: 004F0592
                                              • Part of subcall function 004F0588: LeaveCriticalSection.KERNEL32(005A170C,?,004DD208,005A3540,005127E9,00000001,00000000,?,?,0054EF39,?,?,00000000,00000001,?,00000001), ref: 004F05C5
                                              • Part of subcall function 00543EF6: LoadStringW.USER32(00000066,?,00000FFF,0056DCEC), ref: 00543F3E
                                              • Part of subcall function 00543EF6: LoadStringW.USER32(?,?,00000FFF,?), ref: 00543F64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                            • String ID: x3Z$x3Z$x3Z
                                            • API String ID: 1072379062-323976283
                                            • Opcode ID: c3ef7252dd58eeae9846f440dfe78ddb533ee5ba739b5e0fde704a319a847b27
                                            • Instruction ID: e73a2acc2d394a2f0bf17272af06d4f15366d716db52cd471d9420725ac44f3b
                                            • Opcode Fuzzy Hash: c3ef7252dd58eeae9846f440dfe78ddb533ee5ba739b5e0fde704a319a847b27
                                            • Instruction Fuzzy Hash: 39C19E75A00149AFCB14DF98C8A1DBEBBB9FF58305F50842AF9059B291DB74ED48CB90
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 004DD203
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Init_thread_footer
                                            • String ID: D5Z$D5Z$D5Z
                                            • API String ID: 1385522511-4270867086
                                            • Opcode ID: 30d0a6b86ac651dbcf6da001ee41d25858aa98f3955bd0e4f3a28476a74ae5f7
                                            • Instruction ID: c0185625fe63fbfabfc80bf574dc475923eb0be92836aa0bf784c309f67b9382
                                            • Opcode Fuzzy Hash: 30d0a6b86ac651dbcf6da001ee41d25858aa98f3955bd0e4f3a28476a74ae5f7
                                            • Instruction Fuzzy Hash: E8911775E00206DFCB14CF59C4A06AABBF2FF59314F24816FE9459B340D739AA82DB94
                                            APIs
                                              • Part of subcall function 0053BCDF: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00532A60,?,?,00000034,00000800,?,00000034), ref: 0053BD09
                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00532FF0
                                              • Part of subcall function 0053BCAA: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00532A8F,?,?,00000800,?,00001073,00000000,?,?), ref: 0053BCD4
                                              • Part of subcall function 0053BC06: GetWindowThreadProcessId.USER32(?,?), ref: 0053BC31
                                              • Part of subcall function 0053BC06: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00532A24,00000034,?,?,00001004,00000000,00000000), ref: 0053BC41
                                              • Part of subcall function 0053BC06: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00532A24,00000034,?,?,00001004,00000000,00000000), ref: 0053BC57
                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0053305D
                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005330AA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                            • String ID: @
                                            • API String ID: 4150878124-2766056989
                                            • Opcode ID: 0073d157d976f46736c029684997d827976329f7efdfef5e02b42b73f391cf51
                                            • Instruction ID: 7baf60f75af8bd005d5e957be9f4b6b4327a5e02058017393a6f9ad997c270a5
                                            • Opcode Fuzzy Hash: 0073d157d976f46736c029684997d827976329f7efdfef5e02b42b73f391cf51
                                            • Instruction Fuzzy Hash: 89414C76A0021DAFDB25DFA4CD85ADEBBB8FB45700F004099FA45B7180DA716E89CB61
                                            APIs
                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0053CAC6
                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 0053CB0C
                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,005A2990,01805AA8), ref: 0053CB55
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$InfoItem
                                            • String ID: 0
                                            • API String ID: 135850232-4108050209
                                            • Opcode ID: 32dcfb2ac60ff8ac221837bb71f84f71488613d7a1197c9c00738ccf35e68191
                                            • Instruction ID: 208bbf3932e61ec90820ce4530b25bf7ab2e80caa318066d986ea9f372a6929a
                                            • Opcode Fuzzy Hash: 32dcfb2ac60ff8ac221837bb71f84f71488613d7a1197c9c00738ccf35e68191
                                            • Instruction Fuzzy Hash: 1B41BD306053429FD720DF28C856B1ABFE4BF94324F044A1EF9A5A7291DB71E804CBA2
                                            APIs
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0056DCD0,00000000,?,?,?,?), ref: 00564E09
                                            • GetWindowLongW.USER32 ref: 00564E26
                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00564E36
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$Long
                                            • String ID: SysTreeView32
                                            • API String ID: 847901565-1698111956
                                            • Opcode ID: 27c751960f9fa2cfdb704c0d966c35d40dd26cd4998d53121c049217f95a152c
                                            • Instruction ID: fd7399a589224c31f0a96e0a517c0b89ab06ce4497297be9d51301b5e961a76a
                                            • Opcode Fuzzy Hash: 27c751960f9fa2cfdb704c0d966c35d40dd26cd4998d53121c049217f95a152c
                                            • Instruction Fuzzy Hash: 3D318B31600205AFDF218E78CC45BEA7BA9FB18334F204719F875932E0DB75AC509B60
                                            APIs
                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0056489F
                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 005648B3
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 005648D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window
                                            • String ID: SysMonthCal32
                                            • API String ID: 2326795674-1439706946
                                            • Opcode ID: 71f67f9eb2a06ba199f958976dfd1c8049ac47cfd187641941bd7f1a0e4aff7e
                                            • Instruction ID: 57e1121453014f176b5e71e7219839a96061ca069ea869c65e3dc99228c02714
                                            • Opcode Fuzzy Hash: 71f67f9eb2a06ba199f958976dfd1c8049ac47cfd187641941bd7f1a0e4aff7e
                                            • Instruction Fuzzy Hash: A0217F32600219AFDF158F94CC46FEA3BB9FF88724F150214FA15AB190D6B5A8559BA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00565064
                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00565072
                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00565079
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$DestroyWindow
                                            • String ID: msctls_updown32
                                            • API String ID: 4014797782-2298589950
                                            • Opcode ID: eaa06f0915c2312f88fa919fc369dd4ef9330e1dc03c72d4dcc09002f307b0ea
                                            • Instruction ID: 6b34b5b4f23b8d68ab132859916c3512ba1e081c61f4113b94c738d12bdc8136
                                            • Opcode Fuzzy Hash: eaa06f0915c2312f88fa919fc369dd4ef9330e1dc03c72d4dcc09002f307b0ea
                                            • Instruction Fuzzy Hash: 53217CB5600209AFDB11DF68CC85DBB3BADFF5A3A4F000559F9009B361DA71EC559BA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0056419F
                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 005641AF
                                            • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 005641D5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend$MoveWindow
                                            • String ID: Listbox
                                            • API String ID: 3315199576-2633736733
                                            • Opcode ID: 28becd39e01b6ef9f4ee5c0a48754b1ecdb01b7dbf94f6901af235b6aba2b67c
                                            • Instruction ID: 253e8609b09078ab6c9809039d0aba170d1d90235d09959812d4a535832ac945
                                            • Opcode Fuzzy Hash: 28becd39e01b6ef9f4ee5c0a48754b1ecdb01b7dbf94f6901af235b6aba2b67c
                                            • Instruction Fuzzy Hash: 80219272610218BBEF218F54DC85FBB3B6EFF9A754F108115F9149B190C6719C92DBA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00564BAE
                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00564BC3
                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00564BD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: msctls_trackbar32
                                            • API String ID: 3850602802-1010561917
                                            • Opcode ID: 52300faa6b7db1aec2fdb0dbec2fd62ab985dc9a961104ad407aa506c6b03673
                                            • Instruction ID: 73c28c0f33c86365741ae1c9fcb0e58e64e84e146a072cdb0e79ab862e1f2ba0
                                            • Opcode Fuzzy Hash: 52300faa6b7db1aec2fdb0dbec2fd62ab985dc9a961104ad407aa506c6b03673
                                            • Instruction Fuzzy Hash: C911E031240208BEEF215E69CC06FAB7BA8FF85B64F114519FA55E30A0D671D861DB24
                                            APIs
                                            • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00566220
                                            • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 0056624D
                                            • DrawMenuBar.USER32(?), ref: 0056625C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Menu$InfoItem$Draw
                                            • String ID: 0
                                            • API String ID: 3227129158-4108050209
                                            • Opcode ID: 2ecea1fdf7bcec674b98e794067931b7ff494763dba62ebb2024fee6ff9c660d
                                            • Instruction ID: 72ac6d55f19c06a12bd5022a502111a80b6005113483488d28e4b3aa289195cb
                                            • Opcode Fuzzy Hash: 2ecea1fdf7bcec674b98e794067931b7ff494763dba62ebb2024fee6ff9c660d
                                            • Instruction Fuzzy Hash: 4501A975A00208AFDB209F56CC88BAA7FB4FF84314F04809AF84AD7151DB708A94EF21
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e070822469113f4eb7b2fea855c6956a50ae355d852e8e080630b86a2d0a5549
                                            • Instruction ID: 6af265b7c18db425cfa912b98f7f1ca2bb3366fe518c543716e83498d1084d8d
                                            • Opcode Fuzzy Hash: e070822469113f4eb7b2fea855c6956a50ae355d852e8e080630b86a2d0a5549
                                            • Instruction Fuzzy Hash: B7C15C75A0021AEFDB14CF94C8A4AAEBBB5FF88704F109598E505EB291D731ED81DB90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: __alldvrm$_strrchr
                                            • String ID:
                                            • API String ID: 1036877536-0
                                            • Opcode ID: 173a905e0583d248f4586312a6838000a577cfe73f6efb9ac5c35750ff0a0cfb
                                            • Instruction ID: a59b1afd3a5569b4a6cbdf57a6505e9d5bfbca189c522e6b21df90ef395ca0b3
                                            • Opcode Fuzzy Hash: 173a905e0583d248f4586312a6838000a577cfe73f6efb9ac5c35750ff0a0cfb
                                            • Instruction Fuzzy Hash: D6A125B6A007869FEB25CE58C8917AEBFA4FF55310F18456DEA859B2C1C3389D81CB50
                                            APIs
                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00570BD4,?), ref: 00530E80
                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00570BD4,?), ref: 00530E98
                                            • CLSIDFromProgID.OLE32(?,?,00000000,0056DCE0,000000FF,?,00000000,00000800,00000000,?,00570BD4,?), ref: 00530EBD
                                            • _memcmp.LIBVCRUNTIME ref: 00530EDE
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FromProg$FreeTask_memcmp
                                            • String ID:
                                            • API String ID: 314563124-0
                                            • Opcode ID: ed90e8b500316a9adce7168531fbe84d0b5d0fdcc64e5e17e1e64ad143313f25
                                            • Instruction ID: eb6324a58714b49a0a446a66e11cbcaeecf0df1deda957dea8d61a3325307e83
                                            • Opcode Fuzzy Hash: ed90e8b500316a9adce7168531fbe84d0b5d0fdcc64e5e17e1e64ad143313f25
                                            • Instruction Fuzzy Hash: 52811F71A00209EFCB04DFD4C994DEEBBB9FF89315F104559E506AB250DB71AE05DB60
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0055B00B
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0055B019
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                            • Process32NextW.KERNEL32(00000000,?), ref: 0055B0FB
                                            • CloseHandle.KERNEL32(00000000), ref: 0055B10A
                                              • Part of subcall function 004EE2E5: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00514D4D,?), ref: 004EE30F
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                            • String ID:
                                            • API String ID: 1991900642-0
                                            • Opcode ID: bf1c68cb22b9e322466db9dc88e0964dbe7f59b4b4439b646a8a53f93d9324af
                                            • Instruction ID: 3d596fe92bdac7479482e5a4f01c9b6b1d5e52f0b17db2b8e0fe60c34aab6475
                                            • Opcode Fuzzy Hash: bf1c68cb22b9e322466db9dc88e0964dbe7f59b4b4439b646a8a53f93d9324af
                                            • Instruction Fuzzy Hash: 1C516CB15083009FD310EF25C89AA6BBBE8FF98714F00491EF985D72A1EB74D904CB96
                                            APIs
                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 0055245A
                                            • WSAGetLastError.WSOCK32 ref: 00552468
                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 005524E7
                                            • WSAGetLastError.WSOCK32 ref: 005524F1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ErrorLast$socket
                                            • String ID:
                                            • API String ID: 1881357543-0
                                            • Opcode ID: b7cca377be1098d3564a5359854db7496937f5d01a45c3a033fb4a36bd49069a
                                            • Instruction ID: 16bc11689df8ecc76c73628a38af8db34169601dde70f97056dbc631e5e0d659
                                            • Opcode Fuzzy Hash: b7cca377be1098d3564a5359854db7496937f5d01a45c3a033fb4a36bd49069a
                                            • Instruction Fuzzy Hash: 8741E574600200AFE720AF25C8A6F293BE5AB15708F54C44EF91A8F3D2D776ED41CB90
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00566C41
                                            • ScreenToClient.USER32(?,?), ref: 00566C74
                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00566CE1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$ClientMoveRectScreen
                                            • String ID:
                                            • API String ID: 3880355969-0
                                            • Opcode ID: 11ff0f4a72315f1d58514d84642d36de20135cf730ac33b012c4f51a53b8f1f2
                                            • Instruction ID: 94401f6accdf40362479d4e45e8c73226ab304f2670b32fdc30eba0457f5bcfd
                                            • Opcode Fuzzy Hash: 11ff0f4a72315f1d58514d84642d36de20135cf730ac33b012c4f51a53b8f1f2
                                            • Instruction Fuzzy Hash: F0516D70A00609EFDF10CF68C981AAE7BB6FF55360F108259F8659B2A0D730ED81DB90
                                            APIs
                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 005460DD
                                            • GetLastError.KERNEL32(?,00000000), ref: 00546103
                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00546128
                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00546154
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                            • String ID:
                                            • API String ID: 3321077145-0
                                            • Opcode ID: 97d4d9b04cfd35ed5ff03c749c271d60e4e048510e9c55a878c7432e6f8d1f88
                                            • Instruction ID: a9e5a467c01e9b94b94ef77b2cb7a4cffd0d7cfdbe07f7345de1a885f05b0564
                                            • Opcode Fuzzy Hash: 97d4d9b04cfd35ed5ff03c749c271d60e4e048510e9c55a878c7432e6f8d1f88
                                            • Instruction Fuzzy Hash: 48413C39600610DFCB10EF15C464A5EBBE2EF59718B15848AE84A9B362CB34FC01CF95
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 0056204A
                                              • Part of subcall function 005342CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 005342E6
                                              • Part of subcall function 005342CC: GetCurrentThreadId.KERNEL32 ref: 005342ED
                                              • Part of subcall function 005342CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00532E43), ref: 005342F4
                                            • GetCaretPos.USER32(?), ref: 0056205E
                                            • ClientToScreen.USER32(00000000,?), ref: 005620AB
                                            • GetForegroundWindow.USER32 ref: 005620B1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                            • String ID:
                                            • API String ID: 2759813231-0
                                            • Opcode ID: cd80d2c30c1b09472fbeab113657897057c64fa6486804ce13200ba9772b1a53
                                            • Instruction ID: cb62f9b5a551238df726a2490ac3038cfb1790abf41536d92f3115871a401dfc
                                            • Opcode Fuzzy Hash: cd80d2c30c1b09472fbeab113657897057c64fa6486804ce13200ba9772b1a53
                                            • Instruction Fuzzy Hash: 5A314571E00109AFCB04DFAAC8858AEBBF8FF58314B50446EE415E7311DA75EE05CBA0
                                            APIs
                                              • Part of subcall function 004D4154: _wcslen.LIBCMT ref: 004D4159
                                            • _wcslen.LIBCMT ref: 0053E7F7
                                            • _wcslen.LIBCMT ref: 0053E80E
                                            • _wcslen.LIBCMT ref: 0053E839
                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0053E844
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: _wcslen$ExtentPoint32Text
                                            • String ID:
                                            • API String ID: 3763101759-0
                                            • Opcode ID: f89e7eda3c82e2cee2438f2166835738af29dce89e3e1b53f0b5e30dd2f6ae7d
                                            • Instruction ID: d2398cccc90a82e2f0900b487bb1543e4bd3a9f2616502ed1d97a1b526ecb845
                                            • Opcode Fuzzy Hash: f89e7eda3c82e2cee2438f2166835738af29dce89e3e1b53f0b5e30dd2f6ae7d
                                            • Instruction Fuzzy Hash: FB21A871D00218AFCB119FA9C982BBEBBF4FF85354F154059E904BB281DA749D4187B5
                                            APIs
                                              • Part of subcall function 0053960C: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00538199,?,000000FF,?,00538FE3,00000000,?,0000001C,?,?), ref: 0053961B
                                              • Part of subcall function 0053960C: lstrcpyW.KERNEL32(00000000,?,?,00538199,?,000000FF,?,00538FE3,00000000,?,0000001C,?,?,00000000), ref: 00539641
                                              • Part of subcall function 0053960C: lstrcmpiW.KERNEL32(00000000,?,00538199,?,000000FF,?,00538FE3,00000000,?,0000001C,?,?), ref: 00539672
                                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00538FE3,00000000,?,0000001C,?,?,00000000), ref: 005381B2
                                            • lstrcpyW.KERNEL32(00000000,?,?,00538FE3,00000000,?,0000001C,?,?,00000000), ref: 005381D8
                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00538FE3,00000000,?,0000001C,?,?,00000000), ref: 00538213
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: lstrcmpilstrcpylstrlen
                                            • String ID: cdecl
                                            • API String ID: 4031866154-3896280584
                                            • Opcode ID: 2670e83002e37287896108bb94da985f5aa98a8862b2c68e1cad414a438c0fbc
                                            • Instruction ID: 69e0c38aeac6f3917b483c12720ba35fd8dc623a5da4f55049f0cda841490f84
                                            • Opcode Fuzzy Hash: 2670e83002e37287896108bb94da985f5aa98a8862b2c68e1cad414a438c0fbc
                                            • Instruction Fuzzy Hash: D311D67A200306ABCB155F79D849A7A7BA5FF99350F50402AF906C7250EFB19811D761
                                            APIs
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0056866A
                                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00568689
                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 005686A1
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0054C10A,00000000), ref: 005686CA
                                              • Part of subcall function 004D2441: GetWindowLongW.USER32(00000000,000000EB), ref: 004D2452
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$Long
                                            • String ID:
                                            • API String ID: 847901565-0
                                            • Opcode ID: f78c7253d78f86145c47b074092ad9bff07b17451029a4dd9125575d680affce
                                            • Instruction ID: af2121ecd65fdb693eb8dbe6a7a18a027beff8f86db3b40bc84aee055b95e0ba
                                            • Opcode Fuzzy Hash: f78c7253d78f86145c47b074092ad9bff07b17451029a4dd9125575d680affce
                                            • Instruction Fuzzy Hash: 18119D32600225AFCB108F2DCC08A6A3BA5FB65364F118724F939DB2E0DB708955DB50
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba14539c970992658f70fd6e97cd0199388c7ff2629970a1208b4fc6a7b37aba
                                            • Instruction ID: 3f1aa3e86c3e73ad43757e183b40239746358b2c7a16e93e6b32c97457fe3c46
                                            • Opcode Fuzzy Hash: ba14539c970992658f70fd6e97cd0199388c7ff2629970a1208b4fc6a7b37aba
                                            • Instruction Fuzzy Hash: 7F01DFB26092163EE62126786CCDF2F6F1DEF923B8F340729F620A11D1EAB08C409570
                                            APIs
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 005322D7
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005322E9
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005322FF
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0053231A
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: bb3cc13eb8386787fac8c61b75da662d899c6b925459a56581af303f688513c7
                                            • Instruction ID: ed7c2f98ff2627f2f18f60f5175c33cd6507fcb5a960bb5a180c29de7019fc6a
                                            • Opcode Fuzzy Hash: bb3cc13eb8386787fac8c61b75da662d899c6b925459a56581af303f688513c7
                                            • Instruction Fuzzy Hash: 4A11093AD00219FFEF119BA5CD85F9DBBB8FB08750F200491EA01B7290D6716E10DB94
                                            APIs
                                              • Part of subcall function 004D2441: GetWindowLongW.USER32(00000000,000000EB), ref: 004D2452
                                            • GetClientRect.USER32(?,?), ref: 0056A890
                                            • GetCursorPos.USER32(?), ref: 0056A89A
                                            • ScreenToClient.USER32(?,?), ref: 0056A8A5
                                            • DefDlgProcW.USER32(?,00000020,?,00000000,?), ref: 0056A8D9
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Client$CursorLongProcRectScreenWindow
                                            • String ID:
                                            • API String ID: 4127811313-0
                                            • Opcode ID: 891493514ece2b7b13aeb24bc4035ad390e000e85e31d9843a928d1faf42d2e4
                                            • Instruction ID: 7dbe8b0913fc593e6db0ec34a9e1bbd4514f906ab25f6896a645ae2100ffb4e7
                                            • Opcode Fuzzy Hash: 891493514ece2b7b13aeb24bc4035ad390e000e85e31d9843a928d1faf42d2e4
                                            • Instruction Fuzzy Hash: 26113671A0011AEFEF14DF98D8899EE7BB8FB45300F004855F912E3150D770AA86DFA2
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 0053EA29
                                            • MessageBoxW.USER32(?,?,?,?), ref: 0053EA5C
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0053EA72
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0053EA79
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                            • String ID:
                                            • API String ID: 2880819207-0
                                            • Opcode ID: 399f141f16ab55b5aed44198a30ee14666e0f1b61be2cc674181254a1fde0b1d
                                            • Instruction ID: b7d45d858edd778b42b915d95d426b763ba28e34d7cfa4c60997cf16f51fed0e
                                            • Opcode Fuzzy Hash: 399f141f16ab55b5aed44198a30ee14666e0f1b61be2cc674181254a1fde0b1d
                                            • Instruction Fuzzy Hash: 7411CC76D00258BFCB119BAC9C0A99B7FADBB57310F044556F425E32D0D6B5CD089771
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00568792
                                            • ScreenToClient.USER32(?,?), ref: 005687AA
                                            • ScreenToClient.USER32(?,?), ref: 005687CE
                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 005687E9
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ClientRectScreen$InvalidateWindow
                                            • String ID:
                                            • API String ID: 357397906-0
                                            • Opcode ID: 264c8c138f224e03aed5ca946b1be6d6323e011f5df2adc79c06184af2ba74f5
                                            • Instruction ID: 8fdc789f6f2b2c5b6363fbe5bc33cf5e6356368e796f1e872d1c5d7b9ab67e18
                                            • Opcode Fuzzy Hash: 264c8c138f224e03aed5ca946b1be6d6323e011f5df2adc79c06184af2ba74f5
                                            • Instruction Fuzzy Hash: 521144B9D00209EFDB41CF98D8849EEBBF5FB18310F104166E915E3210D775AA54DF50
                                            APIs
                                            • GetSysColor.USER32(00000008), ref: 004D216C
                                            • SetTextColor.GDI32(?,?), ref: 004D2176
                                            • SetBkMode.GDI32(?,00000001), ref: 004D2189
                                            • GetStockObject.GDI32(00000005), ref: 004D2191
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Color$ModeObjectStockText
                                            • String ID:
                                            • API String ID: 4037423528-0
                                            • Opcode ID: c946c70b8bd9b2b23f5846cf159ca429af67a2e353a056c1b365d8b8e46f6265
                                            • Instruction ID: 6f0e615e1d52b1ec4cd1cf79e360657000b731545cfb86f0f7bff5566c225f4a
                                            • Opcode Fuzzy Hash: c946c70b8bd9b2b23f5846cf159ca429af67a2e353a056c1b365d8b8e46f6265
                                            • Instruction Fuzzy Hash: 06E06531B40240AEDB215B78AC197D97F31AB22335F04C715F6BA551E1C3F14685EB20
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 0052EBD6
                                            • GetDC.USER32(00000000), ref: 0052EBE0
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0052EC00
                                            • ReleaseDC.USER32(?), ref: 0052EC21
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: d0c1c5ca8c32808e43d34039d42b01b20dfff287323284ab35d4e0b20f91d90f
                                            • Instruction ID: 4802831bb3505e1c92abfd7f0891797080d272c6380f83b050627ef0bf9078f0
                                            • Opcode Fuzzy Hash: d0c1c5ca8c32808e43d34039d42b01b20dfff287323284ab35d4e0b20f91d90f
                                            • Instruction Fuzzy Hash: BAE01AB4E00201DFCB50AFA5D80CA6DBBB1FB18311F11884AE80AA3350CB788949AF24
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 0052EBEA
                                            • GetDC.USER32(00000000), ref: 0052EBF4
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0052EC00
                                            • ReleaseDC.USER32(?), ref: 0052EC21
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: 715250e4135d2717edf5838eddd15fdfd2778b310e77d540136770b71e0049d1
                                            • Instruction ID: 72e72fdf17ac591001bf18369e661b8d8792047d40ab40670fe3a6ba1f430b48
                                            • Opcode Fuzzy Hash: 715250e4135d2717edf5838eddd15fdfd2778b310e77d540136770b71e0049d1
                                            • Instruction Fuzzy Hash: 79E01AB4E00200DFCB50AFA5D80C66DBBB1BB18311F11884AE90AA3350C7789909AF24
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 004FE69D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ErrorHandling__start
                                            • String ID: pow
                                            • API String ID: 3213639722-2276729525
                                            • Opcode ID: f82403e8694d1341e334b0fc51230797eb3d320cb3e38dd23f5e905aa9da498c
                                            • Instruction ID: d4fa9f72f9a51a4ee4ba12afcdb0da80b520bb9953c92a7a4e3ed031d98149de
                                            • Opcode Fuzzy Hash: f82403e8694d1341e334b0fc51230797eb3d320cb3e38dd23f5e905aa9da498c
                                            • Instruction Fuzzy Hash: FF51887090810A86DB117B15D905B7F2FA0BF60742F704D1AE0D5822F9EF388CD6EA4A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #
                                            • API String ID: 0-1885708031
                                            • Opcode ID: 55ddfcd3ebe330a3bfde940f76c41656a68aff3db5c0cf2506262176906296d9
                                            • Instruction ID: ce2ecbccf6bde9027b83d716ea058fef2afef80525a6864c4497e6b082edc991
                                            • Opcode Fuzzy Hash: 55ddfcd3ebe330a3bfde940f76c41656a68aff3db5c0cf2506262176906296d9
                                            • Instruction Fuzzy Hash: FC518570505256CFCF14EF69E0406BA7BA0FF16318F24440AE8919B3D1DB38AC42CBA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper_wcslen
                                            • String ID: CALLARGARRAY
                                            • API String ID: 157775604-1150593374
                                            • Opcode ID: 0c7f082097520fea01162b52397289e025262351de5f9456613bc024803cc57b
                                            • Instruction ID: e3007c53eac9ff15a9ef00cac29e12236afe089c9fefe44345da1f75bcabd1d1
                                            • Opcode Fuzzy Hash: 0c7f082097520fea01162b52397289e025262351de5f9456613bc024803cc57b
                                            • Instruction Fuzzy Hash: 4941C271A005099FCB04DFA9C8958BEBFB5FF58325F50405EE806A7352DB749D85CBA0
                                            APIs
                                            • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00564F7E
                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00564F93
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: '
                                            • API String ID: 3850602802-1997036262
                                            • Opcode ID: c3e106a73b08a0fa9cdc937ffab894ebeb611c9c7af4c2ef7c34bad66e821050
                                            • Instruction ID: 00fd375563e2276f39303e75c5169ba2817dcf16e23567d73cafbecb8e1c79b8
                                            • Opcode Fuzzy Hash: c3e106a73b08a0fa9cdc937ffab894ebeb611c9c7af4c2ef7c34bad66e821050
                                            • Instruction Fuzzy Hash: C0313574A0130ADFDB04CFA9C880BEABBB5FF49304F10456AE905AB391D771A981CF90
                                            APIs
                                              • Part of subcall function 004D771B: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004D7759
                                              • Part of subcall function 004D771B: GetStockObject.GDI32(00000011), ref: 004D776D
                                              • Part of subcall function 004D771B: SendMessageW.USER32(00000000,00000030,00000000), ref: 004D7777
                                            • GetWindowRect.USER32(00000000,?), ref: 005640D9
                                            • GetSysColor.USER32(00000012), ref: 005640F3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                            • String ID: static
                                            • API String ID: 1983116058-2160076837
                                            • Opcode ID: 622d239a85986095b220990c8c26bfe71504ebd5970154d9a7424ac6df741da3
                                            • Instruction ID: d699fb1f56759ac6989508576a89292ca0f4330f94e409f214abaf317e6448e3
                                            • Opcode Fuzzy Hash: 622d239a85986095b220990c8c26bfe71504ebd5970154d9a7424ac6df741da3
                                            • Instruction Fuzzy Hash: CD11267261020AAFDB00DFA8CC46AFA7BF8FB18314F004929FD55E7250E674E851DB60
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 00534536: GetClassNameW.USER32(?,?,000000FF), ref: 00534559
                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 005325DC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 624084870-1403004172
                                            • Opcode ID: 09764d955f3faac6c52b9a802ec1ba7e350f0dacdccc27a0d24686d65c52c498
                                            • Instruction ID: 1b4fd08817128b87b8368af8071ecfebb30d76dab4e37e04a906f7a2fe1a5152
                                            • Opcode Fuzzy Hash: 09764d955f3faac6c52b9a802ec1ba7e350f0dacdccc27a0d24686d65c52c498
                                            • Instruction Fuzzy Hash: CE01B571A01115EBCB14EBA4CC65DFE7BA5FF55310F040A1AA862973D6EA34990896A0
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 00534536: GetClassNameW.USER32(?,?,000000FF), ref: 00534559
                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 005324D6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 624084870-1403004172
                                            • Opcode ID: 9278ed6ca170a3a7d791dd42ba61976ba57437c47a850eeccfc003721fb657f4
                                            • Instruction ID: 36ee46c5a4457205d6abb9085327117957c315e0c4d44aab735c6a79fb29bd5a
                                            • Opcode Fuzzy Hash: 9278ed6ca170a3a7d791dd42ba61976ba57437c47a850eeccfc003721fb657f4
                                            • Instruction Fuzzy Hash: F301F771A00109ABDF14EBA0D855EFF7BA9FF51300F14001BA40263292DA649E08C6B1
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 00534536: GetClassNameW.USER32(?,?,000000FF), ref: 00534559
                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00532558
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 624084870-1403004172
                                            • Opcode ID: 3cd421dd56b0b3c70a88cb5a39a5c5902ee8fed48c717155f1a09e1fa8ff62d9
                                            • Instruction ID: 65c8fc5e055ac01cbfd960b4f4cb02e092ee771dda759b4ece0797a77a4d4cf2
                                            • Opcode Fuzzy Hash: 3cd421dd56b0b3c70a88cb5a39a5c5902ee8fed48c717155f1a09e1fa8ff62d9
                                            • Instruction Fuzzy Hash: F5012B71A01105A7CF10E7A4C965FFE7BA9FF11700F14001A740277282EB249F0C86B1
                                            APIs
                                              • Part of subcall function 004DB25F: _wcslen.LIBCMT ref: 004DB269
                                              • Part of subcall function 00534536: GetClassNameW.USER32(?,?,000000FF), ref: 00534559
                                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00532663
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 624084870-1403004172
                                            • Opcode ID: 3318da7cde2cc667c62deaec2a5911b77d6c968fb51da5c06fa784fadbcda277
                                            • Instruction ID: 99aeaeda486fc494ee77f60a3232e1c68a731c04080aa6d2303e6302bce41cbb
                                            • Opcode Fuzzy Hash: 3318da7cde2cc667c62deaec2a5911b77d6c968fb51da5c06fa784fadbcda277
                                            • Instruction Fuzzy Hash: 87F0F471E40219A6DB14E7A48C66FFF7B78FF10710F040A1AB462A32D2DF64580C86A4
                                            APIs
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,005A4018,005A405C), ref: 00568B1E
                                            • CloseHandle.KERNEL32 ref: 00568B30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: \@Z
                                            • API String ID: 3712363035-3777034537
                                            • Opcode ID: de51584e33cd18f7afaabd752d42841a4e107c0f597fa3cf63ed33c1b5afd912
                                            • Instruction ID: c67489c4bbc6a735734d90271beaf5fba93baa105b5138dd92987d803c0271db
                                            • Opcode Fuzzy Hash: de51584e33cd18f7afaabd752d42841a4e107c0f597fa3cf63ed33c1b5afd912
                                            • Instruction Fuzzy Hash: F8F054B2640304BBF2202BA56C49F773A9CFB56754F010425FB08DA191D6F54C44BAB9
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00562C8B
                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00562C9E
                                              • Part of subcall function 0053F1A7: Sleep.KERNEL32 ref: 0053F21F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: 25af874994ea4f5541123ce2f2133a03b7d0ccce598fb43bb0e198be1314c107
                                            • Instruction ID: 6cf9822eac6757ab3140c138e4cc46a7f247259f1f6051e6046bfc7c647c29fe
                                            • Opcode Fuzzy Hash: 25af874994ea4f5541123ce2f2133a03b7d0ccce598fb43bb0e198be1314c107
                                            • Instruction Fuzzy Hash: 49D0C936B94351A6EA68B774EC0FFD66E64EBA4B10F000816B24AAA1D0C9E06804C664
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00562CCB
                                            • PostMessageW.USER32(00000000), ref: 00562CD2
                                              • Part of subcall function 0053F1A7: Sleep.KERNEL32 ref: 0053F21F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: 803d842545ffa499aa9d7bc7920aa515133a075b0b103c00d72089a93f71e4e4
                                            • Instruction ID: e95dde3fde9cb1054f054f6846157404f8ef957c3cd46eef4d3c30c0f422a94d
                                            • Opcode Fuzzy Hash: 803d842545ffa499aa9d7bc7920aa515133a075b0b103c00d72089a93f71e4e4
                                            • Instruction Fuzzy Hash: 54D0C936BC53516AFA68B774EC0FFC66A64EBA8B10F400816B246AA1D0C9E06804C668
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0050C233
                                            • GetLastError.KERNEL32 ref: 0050C241
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0050C29C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2254411569.00000000004D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004D0000, based on PE: true
                                            • Associated: 00000008.00000002.2254389149.00000000004D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.000000000056D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254470938.0000000000593000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254522521.000000000059D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000008.00000002.2254546054.00000000005A5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_4d0000_pjcvfvnncx.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLast
                                            • String ID:
                                            • API String ID: 1717984340-0
                                            • Opcode ID: 9ae701db7a3aab74e39a2d9b39d008bbb9ee13d5eac99faac5870166b72ba935
                                            • Instruction ID: 2c3f553b2e3ed4e45c69472548785d61fd80a3bcbaf008696874c8352064fa55
                                            • Opcode Fuzzy Hash: 9ae701db7a3aab74e39a2d9b39d008bbb9ee13d5eac99faac5870166b72ba935
                                            • Instruction Fuzzy Hash: C341C33560020BAFDB218FE9C844ABE7FA5BF47310F244669E899AB5E1DB308C01D760