Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8R2YjBA8nI.exe

Overview

General Information

Sample name:8R2YjBA8nI.exe
renamed because original name is a hash value
Original sample name:15D3E848E744AA25B6EDBAEFDF57BF3F.exe
Analysis ID:1583412
MD5:15d3e848e744aa25b6edbaefdf57bf3f
SHA1:d6c429733e1f23b522b908aeb8a47d644f27d3b3
SHA256:27aaa78d661532a8c2702640a43496f1fa3f19b3af31d2f3d8110860ff2a9a01
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Execution from Suspicious Folder
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 8R2YjBA8nI.exe (PID: 4592 cmdline: "C:\Users\user\Desktop\8R2YjBA8nI.exe" MD5: 15D3E848E744AA25B6EDBAEFDF57BF3F)
    • cmd.exe (PID: 4712 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Update.exe (PID: 2920 cmdline: C:\Users\Public\Bilite\Axialis\Update.exe MD5: FB325C945A08D06FE91681179BDCCC66)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Bilite\Axialis\Update.exe, NewProcessName: C:\Users\Public\Bilite\Axialis\Update.exe, OriginalFileName: C:\Users\Public\Bilite\Axialis\Update.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4712, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ProcessId: 2920, ProcessName: Update.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 8R2YjBA8nI.exeReversingLabs: Detection: 43%
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C336EB0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,4_2_6C336EB0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C336720 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyHash,CryptReleaseContext,___std_exception_copy,___std_exception_copy,4_2_6C336720
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C336520 CryptStringToBinaryA,CryptStringToBinaryA,___std_exception_copy,4_2_6C336520
Source: 8R2YjBA8nI.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
Source: Binary string: C:\Users\Administrator\Desktop\MFCLibrary_YSS\Release\Update.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmp, Update.dll.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000004.00000000.2139108528.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000004.00000000.2139108528.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdbo source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C35F888 FindFirstFileExW,FindNextFileW,FindClose,FindClose,4_2_6C35F888
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C35F7D7 FindFirstFileExW,4_2_6C35F7D7
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: http://ocsp.sectigo.com0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2137312346.0000000000650000.00000004.00001000.00020000.00000000.sdmp, 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.dr, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: http://www.ijg.org
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/common/baidu/ocpc
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/common/baidu/ocpcbaidu
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://ldapi.ldmnq.com/mnq/properties?openid=&packageName=https://encdn.ldmnq.com/player_files/open
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://middledata.ldmnq.com/collection/biz/upload
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://middledata.ldmnq.com/collection/biz/uploadreport
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://res.ldmnq.com/ld/leidianexhttps://res.ldmnq.com/download/release/ldinst4.0.exehttps://res.ld
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drString found in binary or memory: https://sectigo.com/CPS0
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drString found in binary or memory: https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C336EB0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,CryptDestroyKey,CryptReleaseContext,___std_exception_copy,___std_exception_copy,4_2_6C336EB0
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00404FAA0_2_00404FAA
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0041206B0_2_0041206B
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0041022D0_2_0041022D
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00411F910_2_00411F91
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C350D624_2_6C350D62
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C337E804_2_6C337E80
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C362ED34_2_6C362ED3
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C34EFCF4_2_6C34EFCF
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C3558B04_2_6C3558B0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C34DBA04_2_6C34DBA0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C34C5154_2_6C34C515
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C3675024_2_6C367502
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C3376404_2_6C337640
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C3457A04_2_6C3457A0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C3562344_2_6C356234
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Bilite\Axialis\Update.exe 0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C34C970 appears 52 times
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: String function: 0040243B appears 37 times
Source: 8R2YjBA8nI.exeStatic PE information: invalid certificate
Source: ldplayer9_ld_6000_ld.exe.0.drStatic PE information: Resource name: ZIPRES type: 7-zip archive data, version 0.4
Source: 8R2YjBA8nI.exe, 00000000.00000000.2021380907.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exe, 00000000.00000000.2021380907.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exe, 00000000.00000003.2022244109.000000000249D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exe, 00000000.00000003.2022244109.000000000249D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxII> vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdate.exe vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exeBinary or memory string: OriginalFilename7zSfxNew.exe< vs 8R2YjBA8nI.exe
Source: 8R2YjBA8nI.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal52.winEXE@6/6@0/0
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407776
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040118A GetDiskFreeSpaceExW,SendMessageW,0_2_0040118A
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C3480F0 CreateToolhelp32Snapshot,Process32FirstW,WideCharToMultiByte,_strlen,Process32NextW,CloseHandle,CloseHandle,4_2_6C3480F0
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004034C1
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401BDF
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\BiliteJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3224:120:WilError_03
Source: 8R2YjBA8nI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 8R2YjBA8nI.exeReversingLabs: Detection: 43%
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile read: C:\Users\user\Desktop\8R2YjBA8nI.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\8R2YjBA8nI.exe "C:\Users\user\Desktop\8R2YjBA8nI.exe"
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exe
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: update.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
Source: ldplayer9_ld_6000_ld.exe.lnk.4.drLNK file: ..\..\Public\Bilite\ldplayer9_ld_6000_ld.exe
Source: 8R2YjBA8nI.exeStatic file information: File size 77302708 > 1048576
Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
Source: Binary string: C:\Users\Administrator\Desktop\MFCLibrary_YSS\Release\Update.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmp, Update.dll.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000004.00000000.2139108528.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000004.00000000.2139108528.0000000000132000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: H:\trunk_download\downloader_cn\downloader\bin\ldplayerinst.pdbo source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.dr
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
Source: Update.dll.0.drStatic PE information: section name: .00cfg
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00411C20 push eax; ret 0_2_00411C4E
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C34CAF7 push ecx; ret 4_2_6C34CB0A
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\Bilite\Axialis\Update.dllJump to dropped file
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\Bilite\Axialis\Update.exeJump to dropped file
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeFile created: C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exeJump to dropped file
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeDropped PE file which has not been started: C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exeJump to dropped file
Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 1164Thread sleep time: -73000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C35F888 FindFirstFileExW,FindNextFileW,FindClose,FindClose,4_2_6C35F888
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C35F7D7 FindFirstFileExW,4_2_6C35F7D7
Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 73000Jump to behavior
Source: spyqizkn.png.0.drBinary or memory string: HgFs/
Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_001315D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_001315D0
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_00131A8F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00131A8F
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_001315D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_001315D0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_00131764 SetUnhandledExceptionFilter,4_2_00131764
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C34C85A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C34C85A
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C353AAF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C353AAF
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 4_2_6C34C4ED SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_6C34C4ED
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: 8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drBinary or memory string: .lnkutility::usystem::resolveShortcutFromFileresolveShortcutFromFile buffer is too smallShell_TrayWndnot traywndutility::usystem::getSystBarHeightit is pcutility::usystem::isNoteBookPCit is notebookutility::usystem::isNoteBookPCShcore.dllGetDpiForMonitorldenvAccept: */*
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_0040D72E cpuid 0_2_0040D72E
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00401F9D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,4_2_6C35CEBE
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,4_2_6C36682C
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_6C3668D3
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,4_2_6C3669D9
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,4_2_6C35C9C3
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_6C36645A
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,4_2_6C3666AD
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,4_2_6C36670C
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,4_2_6C3667E1
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_6C36616E
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,4_2_6C3663BF
Source: C:\Users\Public\Bilite\Axialis\Update.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401626
Source: C:\Users\user\Desktop\8R2YjBA8nI.exeCode function: 0_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00404FAA
Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
12
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials35
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583412 Sample: 8R2YjBA8nI.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 52 22 Multi AV Scanner detection for submitted file 2->22 24 Sigma detected: Execution from Suspicious Folder 2->24 7 8R2YjBA8nI.exe 10 2->7         started        process3 file4 16 C:\Users\Public\Bilite\Axialis\Update.exe, PE32 7->16 dropped 18 C:\Users\Public\...\ldplayer9_ld_6000_ld.exe, PE32 7->18 dropped 20 C:\Users\Public\Bilite\Axialis\Update.dll, PE32 7->20 dropped 10 cmd.exe 1 7->10         started        process5 process6 12 Update.exe 2 10->12         started        14 conhost.exe 10->14         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
8R2YjBA8nI.exe43%ReversingLabsWin32.Trojan.Generic
SourceDetectionScannerLabelLink
C:\Users\Public\Bilite\Axialis\Update.exe0%ReversingLabs
C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exe4%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost0%Avira URL Cloudsafe
https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ0%Avira URL Cloudsafe
http://www.ijg.org0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
    high
    https://ldapi.ldmnq.com/common/baidu/ocpcbaidu8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
      high
      https://sectigo.com/CPS08R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
        high
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl08R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
            high
            http://ocsp.sectigo.com08R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
              high
              https://www.ldmnq.com/ldy/xukeXieyi.htmldownloader_jumplink_addresshttps://wpa1.qq.com/V7XjWRDy?_typ8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
                high
                http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
                  high
                  https://middledata.ldmnq.com/collection/biz/uploadreport8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                    high
                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002BB2000.00000004.00000020.00020000.00000000.sdmp, Update.dll.0.drfalse
                      high
                      https://www.ldmnq.com/?n=6120&bd_vid=logidUrlnewTypepost8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ldapi.ldmnq.com/common/baidu/ocpc8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                        high
                        https://middledata.ldmnq.com/collection/biz/upload8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                          high
                          http://www.ijg.org8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://ldapi.ldmnq.com/mnq/properties?openid=&packageName=https://encdn.ldmnq.com/player_files/open8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                            high
                            https://curl.haxx.se/docs/http-cookies.html8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                              high
                              https://res.ldmnq.com/ld/leidianexhttps://res.ldmnq.com/download/release/ldinst4.0.exehttps://res.ld8R2YjBA8nI.exe, 00000000.00000003.2135435614.0000000002C43000.00000004.00000020.00020000.00000000.sdmp, ldplayer9_ld_6000_ld.exe.0.drfalse
                                high
                                No contacted IP infos
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1583412
                                Start date and time:2025-01-02 17:26:11 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 5m 56s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:8
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:8R2YjBA8nI.exe
                                renamed because original name is a hash value
                                Original Sample Name:15D3E848E744AA25B6EDBAEFDF57BF3F.exe
                                Detection:MAL
                                Classification:mal52.winEXE@6/6@0/0
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 68
                                • Number of non-executed functions: 109
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: 8R2YjBA8nI.exe
                                TimeTypeDescription
                                11:27:11API Interceptor1x Sleep call for process: Update.exe modified
                                No context
                                No context
                                No context
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Users\Public\Bilite\Axialis\Update.exe6f0slJzOrF.exeGet hashmaliciousGhostRatBrowse
                                  6f0slJzOrF.exeGet hashmaliciousUnknownBrowse
                                    zPJUOck9wt.exeGet hashmaliciousGhostRatBrowse
                                      zPJUOck9wt.exeGet hashmaliciousUnknownBrowse
                                        MEuu1a2o6n.exeGet hashmaliciousGhostRatBrowse
                                          MEuu1a2o6n.exeGet hashmaliciousUnknownBrowse
                                            Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                            File Type:openssl enc'd data with salted password, base64 encoded
                                            Category:dropped
                                            Size (bytes):64
                                            Entropy (8bit):5.189464015923012
                                            Encrypted:false
                                            SSDEEP:3:iqkaVf3EpDvlLWzdPds1:ilkgDvR0dO1
                                            MD5:E0B9F50885C9027A8479809E48773FB5
                                            SHA1:CD1DDCE77B76428A8377DA9DB6C98CD17D26B4A5
                                            SHA-256:D4100BD47861860EE5B974DA6D1526300EFAD0BEA07A2147DE050F5AB4901AE7
                                            SHA-512:62FD97F720A6FE77E4A5AFD9AEC2C7B5C537A37F44A6F9D60F44A9EE1783FE8BB3A27EEDE5B8671DACCA8E6057F1CF8A839CEEEEB45065BC08C524E83E36D562
                                            Malicious:false
                                            Reputation:low
                                            Preview:U2FsdGVkX19ed6jSWQZ87x5UTzuvDSxWy4TvJSbGs4rG0n3V8HGyYgGC1a8KQsHZ
                                            Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):340760
                                            Entropy (8bit):6.542973942124912
                                            Encrypted:false
                                            SSDEEP:6144:H66LUtNhlhaEDW8zn0iuAhzRgd5KrS8a1GJAlExz30/KUaCcM:H66LUtNrIAzCKzRgDKrSeRUalM
                                            MD5:6CDF82D8FE534D835FAB242751200383
                                            SHA1:72074E82596FBD085BED96EE7F84B291722ECDA3
                                            SHA-256:144F9C2EB947F7DA86D77FE62B2CA893F8C794CDF5E76AFF8B471DC4220599A9
                                            SHA-512:E43B6DFFC19BE693502DF47FB1A009B30D3E45370BDC65604689D2D52517041C163F52450915C69EF48CDB6667A013A52724EE6A50185C7DE6EC1D9DFDCD44F5
                                            Malicious:false
                                            Reputation:low
                                            Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....mg...........!.........L......Y........................................p............@..........................t..O....t..........p6...............)...@...&...r.......................4.......................w...............................text............................... ..`.rdata..............................@..@.data....!..........................@....00cfg..............................@..@.tls................................@....rsrc...p6.......8..................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):395368
                                            Entropy (8bit):5.090673225697451
                                            Encrypted:false
                                            SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                            MD5:FB325C945A08D06FE91681179BDCCC66
                                            SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                            SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                            SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: 6f0slJzOrF.exe, Detection: malicious, Browse
                                            • Filename: 6f0slJzOrF.exe, Detection: malicious, Browse
                                            • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                            • Filename: zPJUOck9wt.exe, Detection: malicious, Browse
                                            • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                            • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):73389290
                                            Entropy (8bit):7.9999949696309285
                                            Encrypted:true
                                            SSDEEP:1572864:4vucsY3Q3QOIErZwXrel/HeIk/o2u1wSkOQJAdq0H8TJZy:4vuc5MpVZwXilWIior1ZEA00cTzy
                                            MD5:1308BAC0A9357B506C13B7861B422E1F
                                            SHA1:BC58C688070CCCF07BFE8F1BDE8D1A7173F8EFA2
                                            SHA-256:93FD6B7AD279A5AB9B86BE7813D5510512EF51F7D93671773C13211CE26FDF92
                                            SHA-512:14F5A66A2149553B2F867B42CC5FA218EDF2648F3281B4FD06BD38C28503AF8BF6668348024A2F4552EDC2654EBB97AAF08389C8478D84CC3D3A73457D08F822
                                            Malicious:false
                                            Reputation:low
                                            Preview:..>..9..x...@..A.xE..._.g..1.Plj.@...........QP.'......b.c.xd.[...M...4Ct..w...~.-M.f`.Fp.+Xq%.}....;d....$.....5(..A..o].......n..3O..4.u..u4.{.........`yRc......#......$...?.$...oa.Cv ...6...3..[L..^.U....2...`..I..E.D....../........Ilc...efn.u..:sHf..'.......@D.V.o..~.."...a....7ABB.......4....).r2...&...g..d.~c.../.PW*cp.&...`9..KtU9.I...'.:y.X. PEd5p-.-.]..1D.(.V#L`1,.........w.2...y:.j*..~....*.....i.......c.D:sg.6......|K..!4..i..0^T.I?A8..[.sxZ.I.#.r.i....S1U.......;<.%....[.....U../.=s..&...bf.\I....R.C.p.....+...C..6.9.$..C_..y.exD..k.2i.-...5..5B...6.g}.}.../".xe4...3t.&N.Q=|.y.R.. t.wGj.S....o..s.R.8.W...lJ. ..?..."0.!.`J...O.....2..):-../...J.)&%.(...AH`hSck..6..}P....4c.SU.3...X.B.!...v....... _....K...+.^.l..{4...%.S....[.[K.1.69..a...B...:..!lZ+W..Q...)....#....ZP..{._,...47...n.G..P........h?.?D...PY.J4.~..K5..^..T..!.P.=j.3.5...S,..:.2.?.X....o...x.....l..+.S.. .d..cj...<..W..?..6.....G.A.:9..>.Y....(sv
                                            Process:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):4540512
                                            Entropy (8bit):7.278249613007746
                                            Encrypted:false
                                            SSDEEP:98304:vevwfTovd3ZIdCCFQfUfQ8aA78VREwBwMu:meol3ZIdCxujaAqRgMu
                                            MD5:EC1580551A183D46B8BE885B7519F1D5
                                            SHA1:4D5B0038633B92A11C3AAFD33DAAFF54D354FD91
                                            SHA-256:D0B485BCBD919FA05653281A9F1AB5B574D19A47AACBFAD89D411B946763FA1A
                                            SHA-512:759C4266DFA1168C6E91791AF71B946F3EE0E217B3CFFDD670BD6E7A811CBB2BECA0F5D9CE7ED06A40BE75C9FE735BBDD767E8A5F1AC6F61F61DB7FA47532D05
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 4%
                                            Reputation:low
                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........r.................E1............n........J............n.....n............n....n.......n.......n...................n.....Rich...........PE..L....:eg.................."..D#...............#...@..........................pF.......E...@..................................K*.|....p,..............D.`R... E..D....#.8............................7).@.............#..............................text...V."......."................. ..`.rdata...d....#..f....#.............@..@.data.........*......h*.............@....rsrc.......p,.......+.............@..@.reloc...D... E..F....C.............@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 2 15:27:10 2025, mtime=Thu Jan 2 15:27:11 2025, atime=Tue Dec 24 02:25:35 2024, length=4540512, window=hide
                                            Category:dropped
                                            Size (bytes):1101
                                            Entropy (8bit):4.686386355501527
                                            Encrypted:false
                                            SSDEEP:12:8mWNY0UYZCECHqXlm4XCFACmqUxyVu2g9fojAZicTzGT9fBav0hbJP4t2YZ/elFH:8mWO0VLAsfsAZnWfov0hbJFqygm
                                            MD5:85B2DC159C3D0B347AACE7587BF6EEB8
                                            SHA1:E1FE997008C325470CE02A73C4FCFCDCC7688F67
                                            SHA-256:7E302DCB42AADE38CCFDD047B51721511F2942E0974B8F62CEF334026D24DFA7
                                            SHA-512:0F9482FF93D29822F71DC03E1D257767D6ED2037B039EBAF08369595E5957A261C2D1A0C451D49A046626BCA8C4F51BA6E5884A227B5945D365EA070F6B9BBB2
                                            Malicious:false
                                            Preview:L..................F.... ....q.,3]..Np.,3]....~.U..`HE..........................P.O. .:i.....+00.../C:\...................x.1.....DW(m..Users.d......OwH"Z].....................:.....NvM.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1....."Z`...Public..f......O.I"Zf.....+...............<......]..P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....T.1....."Zf...Bilite..>......"Z`."Zf............................~..B.i.l.i.t.e.....~.2.`HE..Y2. .LDPLAY~1.EXE..b......"Zf."Zf.............................c.l.d.p.l.a.y.e.r.9._.l.d._.6.0.0.0._.l.d...e.x.e.......^...............-.......]............f{<.....C:\Users\Public\Bilite\ldplayer9_ld_6000_ld.exe..,.....\.....\.P.u.b.l.i.c.\.B.i.l.i.t.e.\.l.d.p.l.a.y.e.r.9._.l.d._.6.0.0.0._.l.d...e.x.e..........v..*.cM.jVD.Es.!...`.......X.......878411...........hT..CrF.f4... .S.2=.b...,...W..hT..CrF.f4... .S.2=.b...,...W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.999896618565362
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:8R2YjBA8nI.exe
                                            File size:77'302'708 bytes
                                            MD5:15d3e848e744aa25b6edbaefdf57bf3f
                                            SHA1:d6c429733e1f23b522b908aeb8a47d644f27d3b3
                                            SHA256:27aaa78d661532a8c2702640a43496f1fa3f19b3af31d2f3d8110860ff2a9a01
                                            SHA512:c6c93121a6a98ce4b857cde3544189c8f9a3312f3a3ade9e7366fb26e625abb2860cca8ac1a9200b8a0982ce22b34962ef09746d43caa580b51ae381085606e5
                                            SSDEEP:1572864:9X0PbA0443v1abVn91uAsrTKaCSMehPEHz7FMosCyx7ry1PVsyw80Zbn9CIrQme:eTAVmaJjsrTKpSMehc7FMohyx7ry19PX
                                            TLSH:DC0833C9B708BB77C410DFB2AADCFB8B21F6D91015159D5E5AA14C47ACDE306036A2CB
                                            File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................@...............................................P.......................b...).
                                            Icon Hash:01e0f2ccd4d4c400
                                            Entrypoint:0x411def
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:
                                            Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:b5a014d7eeb4c2042897567e1288a095
                                            Signature Valid:false
                                            Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                            Signature Validation Error:The digital signature of the object did not verify
                                            Error Number:-2146869232
                                            Not Before, Not After
                                            • 18/07/2022 02:00:00 18/07/2024 01:59:59
                                            Subject Chain
                                            • CN=Incredibuild Software Ltd., O=Incredibuild Software Ltd., S=Tel Aviv, C=IL
                                            Version:3
                                            Thumbprint MD5:8164525B12F9B6829CCD5054865F2D41
                                            Thumbprint SHA-1:583F01EE72450A9945FB1CFA539BAAB983D3F1D9
                                            Thumbprint SHA-256:2EBD549CFBD28201F8773F370E920A21BB010F577BA74B4726332D2CE7836F69
                                            Serial:7098774ED29B0565AB114EF2F2871CF7
                                            Instruction
                                            push ebp
                                            mov ebp, esp
                                            push FFFFFFFFh
                                            push 00414C50h
                                            push 00411F80h
                                            mov eax, dword ptr fs:[00000000h]
                                            push eax
                                            mov dword ptr fs:[00000000h], esp
                                            sub esp, 68h
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [ebp-18h], esp
                                            xor ebx, ebx
                                            mov dword ptr [ebp-04h], ebx
                                            push 00000002h
                                            call dword ptr [00413184h]
                                            pop ecx
                                            or dword ptr [00419924h], FFFFFFFFh
                                            or dword ptr [00419928h], FFFFFFFFh
                                            call dword ptr [00413188h]
                                            mov ecx, dword ptr [0041791Ch]
                                            mov dword ptr [eax], ecx
                                            call dword ptr [0041318Ch]
                                            mov ecx, dword ptr [00417918h]
                                            mov dword ptr [eax], ecx
                                            mov eax, dword ptr [00413190h]
                                            mov eax, dword ptr [eax]
                                            mov dword ptr [00419920h], eax
                                            call 00007FA4A4B9B6D2h
                                            cmp dword ptr [00417710h], ebx
                                            jne 00007FA4A4B9B5BEh
                                            push 00411F78h
                                            call dword ptr [00413194h]
                                            pop ecx
                                            call 00007FA4A4B9B6A4h
                                            push 00417048h
                                            push 00417044h
                                            call 00007FA4A4B9B68Fh
                                            mov eax, dword ptr [00417914h]
                                            mov dword ptr [ebp-6Ch], eax
                                            lea eax, dword ptr [ebp-6Ch]
                                            push eax
                                            push dword ptr [00417910h]
                                            lea eax, dword ptr [ebp-64h]
                                            push eax
                                            lea eax, dword ptr [ebp-70h]
                                            push eax
                                            lea eax, dword ptr [ebp-60h]
                                            push eax
                                            call dword ptr [0041319Ch]
                                            push 00417040h
                                            push 00417000h
                                            call 00007FA4A4B9B65Ch
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x190d7.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x49b629c0x2918
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x1a0000x190d70x19200aedf42f084dabb70902985d8cb8d4f42False0.14223802860696516data4.481844282645869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x1a2080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.42819148936170215
                                            RT_ICON0x1a6700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.2767354596622889
                                            RT_ICON0x1b7180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.2513485477178423
                                            RT_ICON0x1dcc00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.17170524326877656
                                            RT_ICON0x21ee80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.09922512717378446
                                            RT_GROUP_ICON0x327100x4cdataRussianRussia0.7763157894736842
                                            RT_VERSION0x3275c0x350dataEnglishUnited States0.47523584905660377
                                            RT_VERSION0x32aac0x3b0dataChineseChina0.4523305084745763
                                            RT_MANIFEST0x32e5c0x27bASCII text, with very long lines (635), with no line terminatorsEnglishUnited States0.5118110236220472
                                            DLLImport
                                            COMCTL32.dll
                                            KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                            USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                            GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                            SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                            ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                            OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                            MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                            Language of compilation systemCountry where language is spokenMap
                                            RussianRussia
                                            EnglishUnited States
                                            ChineseChina
                                            No network behavior found

                                            Click to jump to process

                                            Click to jump to process

                                            Click to jump to process

                                            Target ID:0
                                            Start time:11:26:59
                                            Start date:02/01/2025
                                            Path:C:\Users\user\Desktop\8R2YjBA8nI.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\8R2YjBA8nI.exe"
                                            Imagebase:0x400000
                                            File size:77'302'708 bytes
                                            MD5 hash:15D3E848E744AA25B6EDBAEFDF57BF3F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:11:27:11
                                            Start date:02/01/2025
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                                            Imagebase:0x790000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:11:27:11
                                            Start date:02/01/2025
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6d64d0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:11:27:11
                                            Start date:02/01/2025
                                            Path:C:\Users\Public\Bilite\Axialis\Update.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\Public\Bilite\Axialis\Update.exe
                                            Imagebase:0x130000
                                            File size:395'368 bytes
                                            MD5 hash:FB325C945A08D06FE91681179BDCCC66
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 0%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:17.8%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:26.9%
                                              Total number of Nodes:1421
                                              Total number of Limit Nodes:14
                                              execution_graph 9093 410e7f 9094 410e9a 9093->9094 9095 410eb5 9094->9095 9097 40f42d 9094->9097 9098 40f445 free 9097->9098 9099 40f437 9097->9099 9100 4024e7 46 API calls 9098->9100 9099->9098 9101 40f456 9099->9101 9100->9101 9101->9095 9089 40e63c 9090 40e5d3 6 API calls 9089->9090 9091 40e644 9090->9091 8243 4024c4 8244 40245a 45 API calls 8243->8244 8245 4024cd 8244->8245 8246 4024d2 8245->8246 8247 4024d3 VirtualAlloc 8245->8247 8248 4096c7 _EH_prolog 8262 4096fa 8248->8262 8249 40971c 8250 409827 8283 40118a 8250->8283 8252 409851 8256 40985e ??2@YAPAXI 8252->8256 8253 40983c 8334 409425 8253->8334 8254 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8254->8262 8258 409878 8256->8258 8257 40969d 8 API calls 8257->8262 8263 409925 ??2@YAPAXI 8258->8263 8264 4098c2 8258->8264 8268 409530 3 API calls 8258->8268 8270 409425 ctype 3 API calls 8258->8270 8272 4099a2 8258->8272 8277 409a65 8258->8277 8293 409fb4 8258->8293 8297 408ea4 8258->8297 8340 409c13 ??2@YAPAXI 8258->8340 8342 409f49 8258->8342 8260 40e959 VirtualFree ??3@YAXPAX free free ctype 8260->8262 8262->8249 8262->8250 8262->8254 8262->8257 8262->8260 8327 4095b7 8262->8327 8331 409403 8262->8331 8263->8258 8337 409530 8264->8337 8268->8258 8270->8258 8273 409530 3 API calls 8272->8273 8274 4099c7 8273->8274 8275 409425 ctype 3 API calls 8274->8275 8275->8249 8279 409530 3 API calls 8277->8279 8280 409a84 8279->8280 8281 409425 ctype 3 API calls 8280->8281 8281->8249 8284 401198 GetDiskFreeSpaceExW 8283->8284 8285 4011ee SendMessageW 8283->8285 8284->8285 8286 4011b0 8284->8286 8291 4011d6 8285->8291 8286->8285 8287 401f9d 19 API calls 8286->8287 8288 4011c9 8287->8288 8289 407717 25 API calls 8288->8289 8290 4011cf 8289->8290 8290->8291 8292 4011e7 8290->8292 8291->8252 8291->8253 8292->8285 8294 409fdd 8293->8294 8346 409dff 8294->8346 8620 40aef3 8297->8620 8300 408ec1 8300->8258 8302 408fd5 8638 408b7c 8302->8638 8303 408f0d ??2@YAPAXI 8312 408ef5 8303->8312 8305 408f31 ??2@YAPAXI 8305->8312 8312->8302 8312->8303 8312->8305 8680 40cdb8 ??2@YAPAXI 8312->8680 8328 4095c6 8327->8328 8330 4095cc 8327->8330 8328->8262 8329 4095e2 _CxxThrowException 8329->8328 8330->8328 8330->8329 8332 40e8e2 4 API calls 8331->8332 8333 40940b 8332->8333 8333->8262 8335 40e8da ctype 3 API calls 8334->8335 8336 409433 8335->8336 8338 408963 ctype 3 API calls 8337->8338 8339 40953b 8338->8339 8341 409c45 8340->8341 8341->8258 8345 409f4e 8342->8345 8343 409f75 8343->8258 8344 409cde 110 API calls 8344->8345 8345->8343 8345->8344 8348 409e04 8346->8348 8347 409e3a 8347->8258 8348->8347 8350 409cde 8348->8350 8351 409cf8 8350->8351 8355 401626 8351->8355 8418 40db1f 8351->8418 8352 409d2c 8352->8348 8356 401642 8355->8356 8362 401638 8355->8362 8421 40a62f _EH_prolog 8356->8421 8358 40166f 8489 40eca9 8358->8489 8359 401411 2 API calls 8361 401688 8359->8361 8363 401962 ??3@YAXPAX 8361->8363 8364 40169d 8361->8364 8362->8352 8368 40eca9 VariantClear 8363->8368 8447 401329 8364->8447 8367 4016a8 8451 401454 8367->8451 8368->8362 8371 401362 2 API calls 8372 4016c7 ??3@YAXPAX 8371->8372 8377 4016d9 8372->8377 8404 401928 ??3@YAXPAX 8372->8404 8374 40eca9 VariantClear 8374->8362 8375 4016fa 8376 40eca9 VariantClear 8375->8376 8378 401702 ??3@YAXPAX 8376->8378 8377->8375 8379 401764 8377->8379 8388 401725 8377->8388 8378->8358 8382 4017a2 8379->8382 8383 401789 8379->8383 8380 40eca9 VariantClear 8381 401737 ??3@YAXPAX 8380->8381 8381->8358 8385 4017c4 GetLocalTime SystemTimeToFileTime 8382->8385 8386 4017aa 8382->8386 8384 40eca9 VariantClear 8383->8384 8387 401791 ??3@YAXPAX 8384->8387 8385->8386 8386->8388 8389 4017e1 8386->8389 8390 4017f8 8386->8390 8387->8358 8388->8380 8456 403354 lstrlenW 8389->8456 8480 40301a GetFileAttributesW 8390->8480 8394 401934 GetLastError 8394->8404 8395 401818 ??2@YAPAXI 8397 401824 8395->8397 8396 40192a 8396->8394 8493 40db53 8397->8493 8400 40190f 8403 40eca9 VariantClear 8400->8403 8401 40185f GetLastError 8496 4012f7 8401->8496 8403->8404 8404->8374 8405 401871 8406 403354 86 API calls 8405->8406 8409 40187f ??3@YAXPAX 8405->8409 8407 4018cc 8406->8407 8407->8409 8411 40db53 2 API calls 8407->8411 8410 40189c 8409->8410 8412 40eca9 VariantClear 8410->8412 8413 4018f1 8411->8413 8414 4018aa ??3@YAXPAX 8412->8414 8415 4018f5 GetLastError 8413->8415 8416 401906 ??3@YAXPAX 8413->8416 8414->8358 8415->8409 8416->8400 8612 40da56 8418->8612 8422 40a738 8421->8422 8423 40a66a 8421->8423 8424 40a687 8422->8424 8425 40a73d 8422->8425 8423->8424 8426 40a704 8423->8426 8427 40a679 8423->8427 8434 40a6ad 8424->8434 8525 40a3b0 8424->8525 8428 40a6f2 8425->8428 8431 40a747 8425->8431 8433 40a699 8425->8433 8426->8434 8499 40e69c 8426->8499 8427->8428 8429 40a67e 8427->8429 8521 40ed34 8428->8521 8437 40a684 8429->8437 8446 40a6b2 8429->8446 8431->8428 8431->8446 8433->8434 8513 40ed59 8433->8513 8508 40ecae 8434->8508 8436 40a71a 8502 40eced 8436->8502 8437->8424 8437->8433 8443 40eca9 VariantClear 8444 40166b 8443->8444 8444->8358 8444->8359 8446->8434 8517 40ed79 8446->8517 8448 401340 8447->8448 8449 40112b 2 API calls 8448->8449 8450 40134b 8449->8450 8450->8367 8452 4012f7 2 API calls 8451->8452 8453 401462 8452->8453 8540 4013e2 8453->8540 8455 40146d 8455->8371 8457 4024fc 2 API calls 8456->8457 8458 403375 8457->8458 8459 40112b 2 API calls 8458->8459 8462 403385 8458->8462 8459->8462 8461 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8463 4033e8 8461->8463 8464 4033f2 8461->8464 8462->8461 8472 403477 8462->8472 8543 401986 CreateDirectoryW 8462->8543 8465 40301a 22 API calls 8463->8465 8466 401986 4 API calls 8464->8466 8469 4033f8 ??3@YAXPAX 8464->8469 8465->8464 8478 403405 8466->8478 8467 4034a7 8468 407776 55 API calls 8467->8468 8475 4034b1 ??3@YAXPAX 8468->8475 8477 4034bc 8469->8477 8470 40340a 8549 407776 8470->8549 8472->8467 8472->8469 8473 40346b ??3@YAXPAX 8473->8477 8474 40341d memcpy 8474->8478 8475->8477 8477->8388 8478->8470 8478->8473 8478->8474 8479 401986 4 API calls 8478->8479 8479->8478 8481 403037 8480->8481 8487 401804 8480->8487 8482 403048 8481->8482 8483 40303b SetLastError 8481->8483 8484 403051 8482->8484 8486 40305f FindFirstFileW 8482->8486 8482->8487 8483->8487 8568 402fed 8484->8568 8486->8484 8488 403072 FindClose CompareFileTime 8486->8488 8487->8394 8487->8395 8487->8396 8488->8484 8488->8487 8490 40ec65 8489->8490 8491 40ec86 VariantClear 8490->8491 8492 40ec9d 8490->8492 8491->8362 8492->8362 8609 40db3c 8493->8609 8497 40112b 2 API calls 8496->8497 8498 401311 8497->8498 8498->8405 8500 4012f7 2 API calls 8499->8500 8501 40e6a9 8500->8501 8501->8436 8529 40ecd7 8502->8529 8505 40ed12 8506 40a726 ??3@YAXPAX 8505->8506 8507 40ed17 _CxxThrowException 8505->8507 8506->8434 8507->8506 8532 40ec65 8508->8532 8510 40ecba 8511 40a7b2 8510->8511 8512 40ecbe memcpy 8510->8512 8511->8443 8512->8511 8514 40ed62 8513->8514 8515 40ed67 8513->8515 8516 40ecd7 VariantClear 8514->8516 8515->8434 8516->8515 8518 40ed82 8517->8518 8519 40ed87 8517->8519 8520 40ecd7 VariantClear 8518->8520 8519->8434 8520->8519 8522 40ed42 8521->8522 8523 40ed3d 8521->8523 8522->8434 8524 40ecd7 VariantClear 8523->8524 8524->8522 8526 40a3c2 8525->8526 8527 40a3de 8526->8527 8536 40eda0 8526->8536 8527->8434 8530 40eca9 VariantClear 8529->8530 8531 40ecdf SysAllocString 8530->8531 8531->8505 8531->8506 8533 40ec6d 8532->8533 8534 40ec86 VariantClear 8533->8534 8535 40ec9d 8533->8535 8534->8510 8535->8510 8537 40edae 8536->8537 8538 40eda9 8536->8538 8537->8527 8539 40ecd7 VariantClear 8538->8539 8539->8537 8541 401398 2 API calls 8540->8541 8542 4013f2 8541->8542 8542->8455 8544 4019c7 8543->8544 8545 401997 GetLastError 8543->8545 8544->8462 8546 4019b1 GetFileAttributesW 8545->8546 8548 4019a6 8545->8548 8546->8544 8546->8548 8547 4019a7 SetLastError 8547->8462 8548->8544 8548->8547 8550 401f9d 19 API calls 8549->8550 8551 40778a wvsprintfW 8550->8551 8552 407859 8551->8552 8553 4077ab GetLastError FormatMessageW 8551->8553 8556 4076a8 25 API calls 8552->8556 8554 4077d9 FormatMessageW 8553->8554 8555 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8553->8555 8554->8552 8554->8555 8560 4076a8 8555->8560 8558 407865 8556->8558 8558->8469 8561 407715 ??3@YAXPAX LocalFree 8560->8561 8562 4076b7 8560->8562 8561->8558 8563 40661a 2 API calls 8562->8563 8564 4076c6 IsWindow 8563->8564 8565 4076ef 8564->8565 8566 4076dd IsBadReadPtr 8564->8566 8567 4073d1 21 API calls 8565->8567 8566->8565 8567->8561 8574 402c86 8568->8574 8570 402ff6 8571 403017 8570->8571 8572 402ffb GetLastError 8570->8572 8571->8487 8573 403006 8572->8573 8573->8487 8575 402c93 GetFileAttributesW 8574->8575 8576 402c8f 8574->8576 8577 402ca4 8575->8577 8578 402ca9 8575->8578 8576->8570 8577->8570 8579 402cc7 8578->8579 8580 402cad SetFileAttributesW 8578->8580 8585 402b79 8579->8585 8582 402cc3 8580->8582 8583 402cba DeleteFileW 8580->8583 8582->8570 8583->8570 8586 4024fc 2 API calls 8585->8586 8587 402b90 8586->8587 8588 40254d 2 API calls 8587->8588 8589 402b9d FindFirstFileW 8588->8589 8590 402c55 SetFileAttributesW 8589->8590 8603 402bbf 8589->8603 8592 402c60 RemoveDirectoryW 8590->8592 8593 402c78 ??3@YAXPAX 8590->8593 8591 401329 2 API calls 8591->8603 8592->8593 8594 402c6d ??3@YAXPAX 8592->8594 8595 402c80 8593->8595 8594->8595 8595->8570 8597 40254d 2 API calls 8597->8603 8598 402c24 SetFileAttributesW 8598->8593 8602 402c2d DeleteFileW 8598->8602 8599 402bef lstrcmpW 8600 402c05 lstrcmpW 8599->8600 8601 402c38 FindNextFileW 8599->8601 8600->8601 8600->8603 8601->8603 8604 402c4e FindClose 8601->8604 8602->8603 8603->8591 8603->8593 8603->8597 8603->8598 8603->8599 8603->8601 8605 402b79 2 API calls 8603->8605 8606 401429 8603->8606 8604->8590 8605->8603 8607 401398 2 API calls 8606->8607 8608 401433 8607->8608 8608->8603 8610 40db1f 2 API calls 8609->8610 8611 401857 8610->8611 8611->8400 8611->8401 8617 40d985 8612->8617 8615 40da65 CreateFileW 8616 40da8a 8615->8616 8616->8352 8618 40d98f CloseHandle 8617->8618 8619 40d99a 8617->8619 8618->8619 8619->8615 8619->8616 8621 40af0c 8620->8621 8636 408ebd 8620->8636 8621->8636 8713 40ac7a 8621->8713 8623 40af3f 8624 40ac7a 7 API calls 8623->8624 8625 40b0cb 8623->8625 8629 40af96 8624->8629 8627 40e959 ctype 4 API calls 8625->8627 8626 40afbd 8720 40e959 8626->8720 8627->8636 8629->8625 8629->8626 8630 40b043 8631 40e959 ctype 4 API calls 8630->8631 8634 40b07f 8631->8634 8632 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8633 40afc6 8632->8633 8633->8630 8633->8632 8635 40e959 ctype 4 API calls 8634->8635 8635->8636 8636->8300 8637 4065ea InitializeCriticalSection 8636->8637 8637->8312 8732 4086f0 8638->8732 8681 40cdc7 8680->8681 8682 408761 4 API calls 8681->8682 8683 40cdde 8682->8683 8683->8312 8714 40e8da ctype 3 API calls 8713->8714 8715 40ac86 8714->8715 8724 40e811 8715->8724 8717 40aca2 8717->8623 8718 409403 4 API calls 8719 40ac90 8718->8719 8719->8717 8719->8718 8721 40e93b 8720->8721 8722 40e8da ctype 3 API calls 8721->8722 8723 40e943 ??3@YAXPAX 8722->8723 8723->8633 8725 40e8a5 8724->8725 8726 40e824 8724->8726 8725->8719 8727 40e833 _CxxThrowException 8726->8727 8728 40e863 ??2@YAPAXI 8726->8728 8729 40e895 ??3@YAXPAX 8726->8729 8727->8726 8728->8726 8730 40e879 memcpy 8728->8730 8729->8725 8730->8729 8733 40e8da ctype 3 API calls 8732->8733 8734 4086f8 8733->8734 8735 40e8da ctype 3 API calls 8734->8735 8736 408700 8735->8736 8737 40e8da ctype 3 API calls 8736->8737 8738 408708 8737->8738 9102 40dace 9105 40daac 9102->9105 9108 40da8f 9105->9108 9109 40da56 2 API calls 9108->9109 9110 40daa9 9109->9110 9092 40dadc ReadFile 9111 411def __set_app_type __p__fmode __p__commode 9112 411e5e 9111->9112 9113 411e72 9112->9113 9114 411e66 __setusermatherr 9112->9114 9123 411f66 _controlfp 9113->9123 9114->9113 9116 411e77 _initterm __getmainargs _initterm 9117 411ecb GetStartupInfoA 9116->9117 9119 411eff GetModuleHandleA 9117->9119 9124 4064af _EH_prolog 9119->9124 9123->9116 9127 404faa 9124->9127 9432 401b37 GetModuleHandleW CreateWindowExW 9127->9432 9130 404fdc 9131 40648e MessageBoxA 9130->9131 9133 404ff6 9130->9133 9132 4064a5 exit _XcptFilter 9131->9132 9134 401411 2 API calls 9133->9134 9135 40502d 9134->9135 9136 401411 2 API calls 9135->9136 9137 405035 9136->9137 9435 403e23 9137->9435 9142 40254d 2 API calls 9143 405073 9142->9143 9444 402a69 9143->9444 9145 40507c 9458 403d71 9145->9458 9148 40509b _wtol 9150 4050b1 9148->9150 9463 404405 9150->9463 9151 4050d6 9152 403d71 6 API calls 9151->9152 9153 4050e1 9152->9153 9154 4050e7 9153->9154 9155 405118 9153->9155 9620 404996 9154->9620 9156 405130 GetModuleFileNameW 9155->9156 9158 40112b 2 API calls 9155->9158 9159 405151 9156->9159 9160 405142 9156->9160 9158->9156 9165 403d71 6 API calls 9159->9165 9162 407776 55 API calls 9160->9162 9161 4050ee ??3@YAXPAX 9638 403e70 9161->9638 9170 4050ec 9162->9170 9164 4050ff ??3@YAXPAX ??3@YAXPAX 9164->9132 9177 405173 9165->9177 9166 4052d5 9167 401362 2 API calls 9166->9167 9168 4052e5 9167->9168 9169 401362 2 API calls 9168->9169 9174 4052f2 9169->9174 9170->9161 9171 4051fa 9171->9170 9172 40522a 9171->9172 9176 405213 _wtol 9171->9176 9173 403d71 6 API calls 9172->9173 9182 405289 9173->9182 9175 40538d ??2@YAPAXI 9174->9175 9178 401329 2 API calls 9174->9178 9184 405399 9175->9184 9176->9172 9177->9166 9177->9170 9177->9171 9177->9172 9181 401429 2 API calls 9177->9181 9179 405327 9178->9179 9180 401329 2 API calls 9179->9180 9186 40533d 9180->9186 9181->9177 9182->9166 9183 404594 2 API calls 9182->9183 9185 4052ba 9183->9185 9187 4053cf 9184->9187 9191 407776 55 API calls 9184->9191 9185->9166 9189 401362 2 API calls 9185->9189 9190 401362 2 API calls 9186->9190 9488 4025ae 9187->9488 9189->9166 9193 405367 9190->9193 9191->9187 9195 401f9d 19 API calls 9193->9195 9194 4025ae 2 API calls 9197 4053f6 9194->9197 9196 40536e 9195->9196 9198 40254d 2 API calls 9196->9198 9199 4025ae 2 API calls 9197->9199 9200 405377 9198->9200 9201 4053fe 9199->9201 9200->9175 9491 404e3f 9201->9491 9206 40546f 9208 405534 9206->9208 9211 403d71 6 API calls 9206->9211 9207 402844 10 API calls 9209 405441 9207->9209 9210 40e8da ctype 3 API calls 9208->9210 9209->9206 9214 407776 55 API calls 9209->9214 9212 40553c 9210->9212 9213 405493 9211->9213 9215 405573 9212->9215 9669 403093 9212->9669 9213->9208 9221 40549d 9213->9221 9216 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9214->9216 9218 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9215->9218 9219 40557c 9215->9219 9216->9206 9218->9161 9218->9170 9223 405588 wsprintfW 9219->9223 9224 4055ed 9219->9224 9230 401411 2 API calls 9219->9230 9231 401329 ??2@YAPAXI ??3@YAXPAX 9219->9231 9234 401f9d 19 API calls 9219->9234 9703 402f6c ??2@YAPAXI 9219->9703 9709 402425 ??3@YAXPAX ??3@YAXPAX 9219->9709 9221->9218 9643 404cbc 9221->9643 9222 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9225 4054f5 9222->9225 9226 401411 2 API calls 9223->9226 9519 404603 9224->9519 9225->9218 9226->9219 9229 4054cc 9229->9218 9232 407776 55 API calls 9229->9232 9230->9219 9231->9219 9233 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9232->9233 9233->9225 9234->9219 9235 40584a 9236 404603 26 API calls 9235->9236 9268 40586a 9236->9268 9240 405933 9581 404034 9240->9581 9241 4024fc 2 API calls 9241->9268 9245 4059d8 CoInitialize 9252 40243b lstrcmpW 9245->9252 9246 40595a 9249 40243b lstrcmpW 9246->9249 9247 405935 ??3@YAXPAX 9247->9240 9251 405969 9249->9251 9250 401411 ??2@YAPAXI ??3@YAXPAX 9250->9268 9253 405979 9251->9253 9255 401f9d 19 API calls 9251->9255 9254 4059fe 9252->9254 9736 403b40 9253->9736 9256 405a12 9254->9256 9259 401329 2 API calls 9254->9259 9255->9253 9587 403b59 9256->9587 9258 401362 2 API calls 9258->9268 9259->9256 9262 4055f6 9262->9235 9275 403b94 lstrlenW lstrlenW _wcsnicmp 9262->9275 9279 4057dd _wtol 9262->9279 9296 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9262->9296 9710 40484d 9262->9710 9721 40408b 9262->9721 9264 4073d1 21 API calls 9267 40599c ctype 9264->9267 9265 401329 2 API calls 9265->9268 9266 405a4d 9270 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9266->9270 9310 405a61 9266->9310 9756 4082e9 9266->9756 9271 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9267->9271 9268->9240 9268->9241 9268->9247 9268->9250 9268->9258 9268->9265 9273 402f6c 7 API calls 9268->9273 9578 40243b 9268->9578 9735 402425 ??3@YAXPAX ??3@YAXPAX 9268->9735 9270->9266 9271->9170 9273->9268 9275->9262 9276 405910 ??3@YAXPAX 9276->9268 9277 401411 2 API calls 9277->9310 9279->9262 9280 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9302 405bf3 9280->9302 9281 405a9f GetKeyState 9281->9310 9282 405c6c 9283 405ca2 9282->9283 9284 405c74 9282->9284 9288 4012f7 2 API calls 9283->9288 9798 403f85 9284->9798 9286 401429 ??2@YAPAXI ??3@YAXPAX 9286->9310 9289 405cb0 9288->9289 9292 403b59 15 API calls 9289->9292 9297 405cb9 9292->9297 9293 407776 55 API calls 9298 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9293->9298 9294 40243b lstrcmpW 9294->9310 9295 401362 2 API calls 9299 405c91 ??3@YAXPAX 9295->9299 9296->9170 9301 405cca ??3@YAXPAX 9297->9301 9305 401362 2 API calls 9297->9305 9298->9302 9306 405cd9 9299->9306 9300 401329 ??2@YAPAXI ??3@YAXPAX 9300->9310 9301->9306 9302->9293 9303 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9302->9303 9303->9302 9304 405bcd ??3@YAXPAX 9304->9310 9305->9301 9307 405d24 9306->9307 9308 405d16 9306->9308 9811 40786b 9307->9811 9594 404a44 9308->9594 9310->9277 9310->9280 9310->9281 9310->9282 9310->9286 9310->9294 9310->9300 9310->9302 9310->9303 9310->9304 9783 407613 9310->9783 9792 407674 9310->9792 9312 405d20 9313 405d65 9312->9313 9817 403e0d 9312->9817 9314 404034 21 API calls 9313->9314 9316 405d77 9314->9316 9318 401411 2 API calls 9316->9318 9319 406373 9316->9319 9320 405d95 9318->9320 9321 4063f7 ctype 9319->9321 9324 40243b lstrcmpW 9319->9324 9364 405da8 9320->9364 9821 40453e 9320->9821 9323 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9321->9323 9329 40243b lstrcmpW 9321->9329 9326 406461 9323->9326 9327 406467 ??3@YAXPAX 9323->9327 9325 4063a4 9324->9325 9325->9321 9848 403f48 9325->9848 9326->9327 9328 403e70 ctype 4 API calls 9327->9328 9330 406478 ??3@YAXPAX ??3@YAXPAX 9328->9330 9332 406416 9329->9332 9330->9132 9331 401411 ??2@YAPAXI ??3@YAXPAX 9331->9364 9332->9323 9336 406423 9332->9336 9335 405dd8 9339 405de5 9335->9339 9340 4061fa ??3@YAXPAX ??3@YAXPAX 9335->9340 9337 4012f7 2 API calls 9336->9337 9342 406432 9337->9342 9338 4073d1 21 API calls 9343 4063e0 ??3@YAXPAX 9338->9343 9830 4043c6 9339->9830 9344 406312 9340->9344 9341 40243b lstrcmpW 9341->9364 9853 404aff 9342->9853 9343->9321 9347 40636a ??3@YAXPAX 9344->9347 9350 404034 21 API calls 9344->9350 9346 405e45 9352 401329 2 API calls 9346->9352 9347->9319 9355 406321 9350->9355 9356 405e4e 9352->9356 9353 4043c6 2 API calls 9354 405e0e 9353->9354 9357 401362 2 API calls 9354->9357 9838 4048ab 9355->9838 9361 403b7f 19 API calls 9356->9361 9362 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9357->9362 9359 40626b ??3@YAXPAX ??3@YAXPAX 9359->9344 9360 401329 2 API calls 9360->9364 9377 405e57 9361->9377 9365 406211 9362->9365 9366 405e41 9362->9366 9363 40633a SetCurrentDirectoryW 9367 4048ab 4 API calls 9363->9367 9364->9331 9364->9335 9364->9341 9364->9346 9364->9359 9364->9360 9368 401429 2 API calls 9364->9368 9371 403e0d 16 API calls 9365->9371 9366->9346 9369 406362 9367->9369 9370 405ee5 ??3@YAXPAX ??3@YAXPAX 9368->9370 9372 403e0d 16 API calls 9369->9372 9370->9364 9373 406216 9371->9373 9372->9347 9374 407776 55 API calls 9373->9374 9375 40621f 7 API calls 9374->9375 9376 40625e 9375->9376 9376->9359 9378 405f61 _wtol 9377->9378 9379 403bce lstrlenW lstrlenW _wcsnicmp 9377->9379 9380 406025 9377->9380 9378->9377 9379->9377 9381 406080 9380->9381 9382 40602e 9380->9382 9383 401362 2 API calls 9381->9383 9384 406053 9382->9384 9385 406034 9382->9385 9386 40607e 9383->9386 9388 401329 2 API calls 9384->9388 9387 401329 2 API calls 9385->9387 9389 40254d 2 API calls 9386->9389 9390 40603f 9387->9390 9391 406051 9388->9391 9392 406092 9389->9392 9393 40254d 2 API calls 9390->9393 9394 40243b lstrcmpW 9391->9394 9395 401411 2 API calls 9392->9395 9396 406048 9393->9396 9397 406068 9394->9397 9398 40609a 9395->9398 9399 40254d 2 API calls 9396->9399 9397->9392 9401 40254d 2 API calls 9397->9401 9400 401411 2 API calls 9398->9400 9399->9391 9402 4060a2 memset 9400->9402 9401->9386 9403 4060e1 9402->9403 9404 404594 2 API calls 9403->9404 9405 4060fe 9404->9405 9406 401329 2 API calls 9405->9406 9407 406109 9406->9407 9408 403b7f 19 API calls 9407->9408 9409 406112 9408->9409 9410 4061b1 9409->9410 9614 4021ed 9409->9614 9412 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9412 9414 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9414 9412->9344 9414->9340 9415 406150 9417 403b7f 19 API calls 9415->9417 9416 401429 2 API calls 9418 406147 9416->9418 9419 406168 ShellExecuteExW 9417->9419 9421 40254d 2 API calls 9418->9421 9422 406282 9419->9422 9423 40618c 9419->9423 9421->9415 9426 407776 55 API calls 9422->9426 9424 4061a0 CloseHandle 9423->9424 9425 406192 WaitForSingleObject 9423->9425 9835 402185 9424->9835 9425->9424 9428 40628c 9426->9428 9429 403e0d 16 API calls 9428->9429 9430 406291 9 API calls 9429->9430 9431 4062e1 9430->9431 9431->9412 9433 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9432->9433 9434 401b9f GetVersionExW 9432->9434 9433->9434 9434->9130 9434->9131 9436 40112b 2 API calls 9435->9436 9437 403e38 GetCommandLineW 9436->9437 9438 404594 9437->9438 9439 4045ce 9438->9439 9441 4045a2 9438->9441 9440 4045c6 9439->9440 9443 401429 2 API calls 9439->9443 9440->9142 9441->9440 9442 401429 2 API calls 9441->9442 9442->9441 9443->9439 9445 401411 2 API calls 9444->9445 9453 402a79 9445->9453 9446 401362 2 API calls 9447 402b6c ??3@YAXPAX 9446->9447 9447->9145 9448 401429 ??2@YAPAXI ??3@YAXPAX 9448->9453 9449 402b5f 9449->9446 9451 401411 2 API calls 9451->9453 9453->9448 9453->9449 9453->9451 9454 401362 2 API calls 9453->9454 9892 4025c6 9453->9892 9895 40272e 9453->9895 9455 402ad9 ??3@YAXPAX 9454->9455 9456 4013e2 2 API calls 9455->9456 9457 402aee ??3@YAXPAX ??3@YAXPAX 9456->9457 9457->9453 9459 403d80 9458->9459 9460 403dbd 9459->9460 9461 403d9a lstrlenW lstrlenW 9459->9461 9460->9148 9460->9150 9906 401a85 9461->9906 9464 401f47 3 API calls 9463->9464 9465 404416 9464->9465 9466 401f9d 19 API calls 9465->9466 9467 40441d 9466->9467 9468 401f9d 19 API calls 9467->9468 9469 404429 9468->9469 9470 401f9d 19 API calls 9469->9470 9471 404435 9470->9471 9472 401f9d 19 API calls 9471->9472 9473 404441 9472->9473 9474 401f9d 19 API calls 9473->9474 9475 40444d 9474->9475 9476 401f9d 19 API calls 9475->9476 9477 404459 9476->9477 9478 401f9d 19 API calls 9477->9478 9479 404465 9478->9479 9480 404480 SHGetSpecialFolderPathW 9479->9480 9483 404533 #17 9479->9483 9484 401411 2 API calls 9479->9484 9485 401329 ??2@YAPAXI ??3@YAXPAX 9479->9485 9487 402f6c 7 API calls 9479->9487 9911 402425 ??3@YAXPAX ??3@YAXPAX 9479->9911 9480->9479 9481 40449a wsprintfW 9480->9481 9482 401411 2 API calls 9481->9482 9482->9479 9483->9151 9484->9479 9485->9479 9487->9479 9489 4022b0 2 API calls 9488->9489 9490 4025c2 9489->9490 9490->9194 9912 403e86 9491->9912 9493 404e56 9494 403e86 2 API calls 9493->9494 9495 404e65 9494->9495 9916 404343 9495->9916 9499 404e82 ??3@YAXPAX 9500 404343 3 API calls 9499->9500 9501 404e9d 9500->9501 9502 403ec1 2 API calls 9501->9502 9503 404ea8 ??3@YAXPAX wsprintfA 9502->9503 9932 403ef6 9503->9932 9505 404ed0 9506 403ef6 2 API calls 9505->9506 9507 404edb 9506->9507 9508 402844 9507->9508 9509 402851 9508->9509 9517 40dcfb 3 API calls 9509->9517 9510 402863 lstrlenA lstrlenA 9515 402890 9510->9515 9511 40296e 9511->9206 9511->9207 9512 40293b memmove 9512->9511 9512->9515 9513 4028db memcmp 9513->9511 9513->9515 9514 402918 memcmp 9514->9515 9515->9511 9515->9512 9515->9513 9515->9514 9518 40dcc7 GetLastError 9515->9518 9943 402640 9515->9943 9517->9510 9518->9515 9520 40243b lstrcmpW 9519->9520 9521 40461c 9520->9521 9522 40466c 9521->9522 9524 401329 2 API calls 9521->9524 9523 40243b lstrcmpW 9522->9523 9525 40468a 9523->9525 9526 404633 9524->9526 9529 40243b lstrcmpW 9525->9529 9527 401f9d 19 API calls 9526->9527 9528 40463a 9527->9528 9531 40254d 2 API calls 9528->9531 9530 4046a2 9529->9530 9533 40243b lstrcmpW 9530->9533 9532 404643 9531->9532 9534 401329 2 API calls 9532->9534 9535 4046ba 9533->9535 9536 40465c 9534->9536 9538 40243b lstrcmpW 9535->9538 9537 401f9d 19 API calls 9536->9537 9539 404663 9537->9539 9540 4046d2 9538->9540 9541 40254d 2 API calls 9539->9541 9542 4046e9 9540->9542 9543 4046d9 lstrcmpiW 9540->9543 9541->9522 9544 40243b lstrcmpW 9542->9544 9543->9542 9545 4046ff 9544->9545 9546 40243b lstrcmpW 9545->9546 9547 40472c 9546->9547 9548 404739 9547->9548 9946 403d1f 9547->9946 9550 40243b lstrcmpW 9548->9550 9554 40474d 9550->9554 9551 40476d 9552 40243b lstrcmpW 9551->9552 9559 404780 9552->9559 9554->9551 9555 40243b lstrcmpW 9554->9555 9950 403cc6 9554->9950 9555->9554 9556 4047a0 9558 40243b lstrcmpW 9556->9558 9560 4047ac 9558->9560 9559->9556 9561 40243b lstrcmpW 9559->9561 9954 403cf7 9559->9954 9562 40243b lstrcmpW 9560->9562 9561->9559 9563 4047bd 9562->9563 9564 40243b lstrcmpW 9563->9564 9565 4047ce 9564->9565 9566 4047e4 9565->9566 9567 4047db _wtol 9565->9567 9568 40243b lstrcmpW 9566->9568 9567->9566 9569 4047f0 9568->9569 9570 404800 9569->9570 9571 4047f7 _wtol 9569->9571 9572 40243b lstrcmpW 9570->9572 9571->9570 9573 40480c 9572->9573 9574 40243b lstrcmpW 9573->9574 9575 404824 9574->9575 9576 40243b lstrcmpW 9575->9576 9577 40483c 9576->9577 9577->9262 9962 4023dd 9578->9962 9582 404045 9581->9582 9583 404088 9581->9583 9584 4012f7 2 API calls 9582->9584 9585 403b7f 19 API calls 9582->9585 9583->9245 9583->9246 9584->9582 9586 404062 SetEnvironmentVariableW ??3@YAXPAX 9585->9586 9586->9582 9586->9583 9588 40393b 7 API calls 9587->9588 9589 403b69 9588->9589 9590 4039f6 7 API calls 9589->9590 9591 403b74 9590->9591 9592 4027c7 6 API calls 9591->9592 9593 403b7a 9592->9593 9593->9266 9739 4083b6 9593->9739 9966 408676 9594->9966 9596 404a55 ??2@YAPAXI 9597 404a64 9596->9597 9611 40dcfb 3 API calls 9597->9611 9598 404a85 9968 40a7de _EH_prolog 9598->9968 9984 40b2fc 9598->9984 9599 404a95 9600 404ab3 9599->9600 9601 404a99 9599->9601 9603 404ada ??2@YAPAXI 9600->9603 9607 403354 86 API calls 9600->9607 9602 407776 55 API calls 9601->9602 9606 404aa1 9602->9606 9604 404ae6 9603->9604 9605 404aed 9603->9605 10009 404292 9604->10009 9990 40150b 9605->9990 9606->9312 9609 404ac6 9607->9609 9609->9603 9609->9606 9611->9598 9615 402200 LoadLibraryA GetProcAddress 9614->9615 9616 4021fb 9614->9616 9617 40221b 9615->9617 9618 402223 9615->9618 9616->9410 9616->9415 9616->9416 9617->9616 9618->9617 10472 4021b9 LoadLibraryA GetProcAddress 9618->10472 9621 40661a 2 API calls 9620->9621 9622 4049af 9621->9622 9623 401f9d 19 API calls 9622->9623 9624 4049bd 9623->9624 9625 4024fc 2 API calls 9624->9625 9626 4049c7 9625->9626 9627 4049fd 9626->9627 9629 40254d ??2@YAPAXI ??3@YAXPAX 9626->9629 9628 40254d 2 API calls 9627->9628 9630 404a0a 9628->9630 9629->9626 9631 401f9d 19 API calls 9630->9631 9632 404a11 9631->9632 9633 40254d 2 API calls 9632->9633 9634 404a1b 9633->9634 9635 4073d1 21 API calls 9634->9635 9636 404a30 ??3@YAXPAX 9635->9636 9637 404a41 ctype 9636->9637 9637->9170 9639 40e8da ctype 3 API calls 9638->9639 9640 403e7e 9639->9640 9641 40e8da ctype 3 API calls 9640->9641 9642 40e943 ??3@YAXPAX 9641->9642 9642->9164 9644 40db53 2 API calls 9643->9644 9645 404ce8 9644->9645 9646 404d44 9645->9646 9648 4024fc 2 API calls 9645->9648 9647 4025ae 2 API calls 9646->9647 9649 404d4c 9647->9649 9650 404cf7 9648->9650 9651 403e86 2 API calls 9649->9651 9654 404db5 ??3@YAXPAX 9650->9654 9656 403354 86 API calls 9650->9656 9652 404d59 9651->9652 9653 403ef6 2 API calls 9652->9653 9655 404d66 9653->9655 9668 404db1 9654->9668 9657 403ef6 2 API calls 9655->9657 9658 404d1b 9656->9658 9659 404d73 9657->9659 9658->9654 9661 40db53 2 API calls 9658->9661 9660 403ef6 2 API calls 9659->9660 9662 404d80 9660->9662 9663 404d37 9661->9663 9664 40dd5f 2 API calls 9662->9664 9663->9654 9665 404d3b ??3@YAXPAX 9663->9665 9666 404d94 9664->9666 9665->9646 9666->9654 9667 404d9d ??3@YAXPAX 9666->9667 9667->9668 9668->9229 9670 4025ae 2 API calls 9669->9670 9686 4030a8 9670->9686 9671 403301 9672 403344 ??3@YAXPAX 9671->9672 9673 40334e 9672->9673 9673->9215 9673->9222 9674 401411 ??2@YAPAXI ??3@YAXPAX 9674->9686 9676 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9676->9686 9677 401362 2 API calls 9678 4030f3 ??3@YAXPAX ??3@YAXPAX 9677->9678 9679 403303 9678->9679 9678->9686 10480 4029c3 9679->10480 9683 40331c ??3@YAXPAX 9683->9673 9684 4031e5 strncmp 9685 4031d0 strncmp 9684->9685 9684->9686 9685->9684 9685->9686 9686->9671 9686->9674 9686->9676 9686->9677 9686->9679 9686->9684 9687 401362 2 API calls 9686->9687 9688 402640 2 API calls 9686->9688 9691 402640 ??2@YAPAXI ??3@YAXPAX 9686->9691 9693 4023dd lstrcmpW 9686->9693 9694 402f6c 7 API calls 9686->9694 9696 403330 9686->9696 9697 4032b2 lstrcmpW 9686->9697 9701 401329 2 API calls 9686->9701 10474 402986 9686->10474 10479 402425 ??3@YAXPAX ??3@YAXPAX 9686->10479 9689 403252 ??3@YAXPAX 9687->9689 9688->9685 9690 402a69 9 API calls 9689->9690 9692 403263 lstrcmpW 9690->9692 9691->9686 9692->9686 9693->9686 9694->9686 9699 402f6c 7 API calls 9696->9699 9697->9686 9698 4032c0 lstrcmpW 9697->9698 9698->9686 9700 40333c 9699->9700 10498 402425 ??3@YAXPAX ??3@YAXPAX 9700->10498 9701->9686 9704 402f86 9703->9704 9705 402f7b 9703->9705 9707 408761 4 API calls 9704->9707 10500 402668 9705->10500 9708 402f92 9707->9708 9708->9219 9709->9219 9711 4024fc 2 API calls 9710->9711 9712 40485f 9711->9712 9713 40254d 2 API calls 9712->9713 9714 40486c 9713->9714 9715 404888 9714->9715 9716 401429 2 API calls 9714->9716 9717 40254d 2 API calls 9715->9717 9716->9714 9718 404892 9717->9718 9719 40408b 94 API calls 9718->9719 9720 40489d ??3@YAXPAX 9719->9720 9720->9262 9722 4040a2 lstrlenW 9721->9722 9723 4040ce 9721->9723 9724 401a85 4 API calls 9722->9724 9723->9262 9725 4040b8 9724->9725 9725->9722 9725->9723 9726 4040d5 9725->9726 9727 4024fc 2 API calls 9726->9727 9730 4040de 9727->9730 10505 402776 9730->10505 9731 403093 84 API calls 9732 40414c 9731->9732 9733 404156 ??3@YAXPAX ??3@YAXPAX 9732->9733 9734 40416d ??3@YAXPAX ??3@YAXPAX 9732->9734 9733->9723 9734->9723 9735->9276 9737 40661a 2 API calls 9736->9737 9738 403b48 9737->9738 9738->9264 9740 408646 9739->9740 9752 4083d5 ctype 9739->9752 9740->9270 9741 40243b lstrcmpW 9741->9752 9742 40661a 2 API calls 9742->9752 9743 40786b 23 API calls 9743->9752 9745 407674 23 API calls 9745->9752 9746 407613 23 API calls 9746->9752 9747 403b40 2 API calls 9747->9752 9748 401f9d 19 API calls 9748->9752 9749 407776 55 API calls 9749->9752 9750 403f48 4 API calls 9750->9752 9751 4073d1 21 API calls 9751->9752 9752->9740 9752->9741 9752->9742 9752->9743 9752->9745 9752->9746 9752->9747 9752->9748 9752->9749 9752->9750 9752->9751 9753 407717 25 API calls 9752->9753 9754 4073d1 21 API calls 9752->9754 10515 40744b 9752->10515 9753->9752 9755 408476 ??3@YAXPAX 9754->9755 9755->9752 9757 40243b lstrcmpW 9756->9757 9758 4082fd 9757->9758 9759 40830b 9758->9759 10519 4019f0 GetStdHandle WriteFile 9758->10519 9761 40831e 9759->9761 10520 4019f0 GetStdHandle WriteFile 9759->10520 9766 408333 9761->9766 10521 4019f0 GetStdHandle WriteFile 9761->10521 9765 40243b lstrcmpW 9768 408351 9765->9768 9767 408344 9766->9767 10522 4019f0 GetStdHandle WriteFile 9766->10522 9767->9765 9769 40835f 9768->9769 10523 4019f0 GetStdHandle WriteFile 9768->10523 9771 40243b lstrcmpW 9769->9771 9772 40836c 9771->9772 9773 40837a 9772->9773 10524 4019f0 GetStdHandle WriteFile 9772->10524 9775 40243b lstrcmpW 9773->9775 9776 408387 9775->9776 9777 408395 9776->9777 10525 4019f0 GetStdHandle WriteFile 9776->10525 9779 40243b lstrcmpW 9777->9779 9780 4083a2 9779->9780 9781 4083b2 9780->9781 10526 4019f0 GetStdHandle WriteFile 9780->10526 9781->9266 9784 407636 9783->9784 9785 407658 9784->9785 9786 40764b 9784->9786 10530 407186 9785->10530 10527 407154 9786->10527 9789 407653 9790 4073d1 21 API calls 9789->9790 9791 407671 9790->9791 9791->9310 9793 407689 9792->9793 9794 40716d 2 API calls 9793->9794 9795 407694 9794->9795 9796 4073d1 21 API calls 9795->9796 9797 4076a5 9796->9797 9797->9310 9799 401411 2 API calls 9798->9799 9800 403f96 9799->9800 9801 402535 2 API calls 9800->9801 9802 403f9f GetTempPathW 9801->9802 9803 403fb8 9802->9803 9807 403fcf 9802->9807 9804 402535 2 API calls 9803->9804 9805 403fc3 GetTempPathW 9804->9805 9805->9807 9806 402535 2 API calls 9808 403ff2 wsprintfW 9806->9808 9807->9806 9809 404009 GetFileAttributesW 9807->9809 9810 40402d 9807->9810 9808->9807 9809->9807 9809->9810 9810->9295 9812 40787e 9811->9812 10536 40719f 9812->10536 9815 4073d1 21 API calls 9816 4078b3 9815->9816 9816->9312 9818 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9817->9818 9819 403e16 9817->9819 9818->9313 9820 402c86 16 API calls 9819->9820 9820->9818 9822 40243b lstrcmpW 9821->9822 9823 40455d 9822->9823 9824 404592 9823->9824 9825 401329 2 API calls 9823->9825 9824->9364 9826 40456c 9825->9826 9827 403b7f 19 API calls 9826->9827 9828 404572 9827->9828 9828->9824 9829 401429 2 API calls 9828->9829 9829->9824 9831 4012f7 2 API calls 9830->9831 9832 4043d4 9831->9832 9833 40254d 2 API calls 9832->9833 9834 4043df 9833->9834 9834->9353 9836 4021a9 9835->9836 9837 40218e LoadLibraryA GetProcAddress 9835->9837 9836->9410 9837->9836 9839 401411 2 API calls 9838->9839 9846 4048bc 9839->9846 9840 401329 2 API calls 9840->9846 9841 40494e 9842 404988 ??3@YAXPAX 9841->9842 9844 4048ab 3 API calls 9841->9844 9842->9363 9843 401429 2 API calls 9843->9846 9845 404985 9844->9845 9845->9842 9846->9840 9846->9841 9846->9843 9847 40243b lstrcmpW 9846->9847 9847->9846 9849 40661a 2 API calls 9848->9849 9850 403f50 9849->9850 9851 401411 2 API calls 9850->9851 9852 403f5e 9851->9852 9852->9338 9854 404cb1 ??3@YAXPAX 9853->9854 9855 404b15 9853->9855 9857 404cb7 9854->9857 9855->9854 9856 404b29 GetDriveTypeW 9855->9856 9856->9854 9858 404b55 9856->9858 9857->9323 9859 403f85 6 API calls 9858->9859 9860 404b63 CreateFileW 9859->9860 9861 404b89 9860->9861 9862 404c7b ??3@YAXPAX ??3@YAXPAX 9860->9862 9863 401411 2 API calls 9861->9863 9862->9857 9864 404b92 9863->9864 9865 401329 2 API calls 9864->9865 9866 404b9f 9865->9866 9867 40254d 2 API calls 9866->9867 9868 404bad 9867->9868 9869 4013e2 2 API calls 9868->9869 9870 404bb9 9869->9870 9871 40254d 2 API calls 9870->9871 9872 404bc7 9871->9872 9873 40254d 2 API calls 9872->9873 9874 404bd4 9873->9874 9875 4013e2 2 API calls 9874->9875 9876 404be0 9875->9876 9877 40254d 2 API calls 9876->9877 9878 404bed 9877->9878 9879 40254d 2 API calls 9878->9879 9880 404bf6 9879->9880 9881 4013e2 2 API calls 9880->9881 9882 404c02 9881->9882 9883 40254d 2 API calls 9882->9883 9884 404c0b 9883->9884 9885 402776 3 API calls 9884->9885 9886 404c1d WriteFile ??3@YAXPAX CloseHandle 9885->9886 9887 404c4b 9886->9887 9888 404c8c 9886->9888 9887->9888 9889 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9887->9889 9890 402c86 16 API calls 9888->9890 9889->9862 9891 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9890->9891 9891->9857 9901 4022b0 9892->9901 9896 401411 2 API calls 9895->9896 9897 40273a 9896->9897 9898 402772 9897->9898 9899 402535 2 API calls 9897->9899 9898->9453 9900 402757 MultiByteToWideChar 9899->9900 9900->9898 9902 4022ea 9901->9902 9903 4022be ??2@YAPAXI 9901->9903 9902->9453 9903->9902 9904 4022cf ??3@YAXPAX 9903->9904 9904->9902 9907 401ae3 9906->9907 9910 401a97 9906->9910 9907->9460 9908 401abc CharUpperW CharUpperW 9909 401af3 CharUpperW CharUpperW 9908->9909 9908->9910 9909->9907 9910->9907 9910->9908 9911->9479 9913 403e9e 9912->9913 9914 4022b0 2 API calls 9913->9914 9915 403eac 9914->9915 9915->9493 9917 40435e 9916->9917 9918 404375 9917->9918 9919 40436a 9917->9919 9920 4025ae 2 API calls 9918->9920 9936 4025f6 9919->9936 9921 40437e 9920->9921 9923 4022b0 2 API calls 9921->9923 9925 404387 9923->9925 9924 404373 9928 403ec1 9924->9928 9926 4025f6 2 API calls 9925->9926 9927 4043b5 ??3@YAXPAX 9926->9927 9927->9924 9929 403ecd 9928->9929 9931 403ede 9928->9931 9930 4022b0 2 API calls 9929->9930 9930->9931 9931->9499 9933 403f06 9932->9933 9939 4022fc 9933->9939 9935 403f13 9935->9505 9937 4022b0 2 API calls 9936->9937 9938 402610 9937->9938 9938->9924 9940 402340 9939->9940 9941 402310 9939->9941 9940->9935 9942 4022b0 2 API calls 9941->9942 9942->9940 9944 4022fc 2 API calls 9943->9944 9945 40264a 9944->9945 9945->9515 9947 403d3d 9946->9947 9958 403c63 9947->9958 9951 403cd3 9950->9951 9952 403c63 _wtol 9951->9952 9953 403cf4 9952->9953 9953->9554 9955 403d04 9954->9955 9956 403c63 _wtol 9955->9956 9957 403d1c 9956->9957 9957->9559 9959 403c6d 9958->9959 9960 403c88 _wtol 9959->9960 9961 403cc1 9959->9961 9960->9959 9961->9548 9965 4023e8 9962->9965 9963 4023f4 lstrcmpW 9964 402411 9963->9964 9963->9965 9964->9268 9965->9963 9965->9964 9967 408679 9966->9967 9967->9596 9969 40a7fe 9968->9969 9970 40b2fc 11 API calls 9969->9970 9971 40a823 9970->9971 9972 40a845 9971->9972 9973 40a82c 9971->9973 10014 40cc59 _EH_prolog 9972->10014 10017 40a3fe 9973->10017 9985 40b30d 9984->9985 9989 40dcfb 3 API calls 9985->9989 9986 40b321 9987 40b331 9986->9987 10453 40b163 9986->10453 9987->9599 9989->9986 9991 40151e 9990->9991 9992 401329 2 API calls 9991->9992 9993 40152b 9992->9993 9994 401429 2 API calls 9993->9994 9995 401534 CreateThread 9994->9995 9996 401563 9995->9996 9997 401568 WaitForSingleObject 9995->9997 10466 40129c 9995->10466 9998 40786b 23 API calls 9996->9998 9999 401585 9997->9999 10000 4015b7 9997->10000 9998->9997 10003 4015a3 9999->10003 10006 401594 9999->10006 10001 4015b3 10000->10001 10002 4015bf GetExitCodeThread 10000->10002 10001->9606 10004 4015d6 10002->10004 10005 407776 55 API calls 10003->10005 10004->10001 10004->10006 10007 401605 SetLastError 10004->10007 10005->10001 10006->10001 10008 407776 55 API calls 10006->10008 10007->10006 10008->10001 10010 401411 2 API calls 10009->10010 10011 4042ab 10010->10011 10012 401411 2 API calls 10011->10012 10013 4042b7 10012->10013 10013->9605 10025 40c9fc 10014->10025 10436 40a28e 10017->10436 10047 40a0bf 10025->10047 10181 40a030 10047->10181 10182 40e8da ctype 3 API calls 10181->10182 10183 40a039 10182->10183 10184 40e8da ctype 3 API calls 10183->10184 10185 40a041 10184->10185 10186 40e8da ctype 3 API calls 10185->10186 10187 40a049 10186->10187 10188 40e8da ctype 3 API calls 10187->10188 10189 40a051 10188->10189 10190 40e8da ctype 3 API calls 10189->10190 10191 40a059 10190->10191 10192 40e8da ctype 3 API calls 10191->10192 10193 40a061 10192->10193 10194 40e8da ctype 3 API calls 10193->10194 10195 40a06b 10194->10195 10196 40e8da ctype 3 API calls 10195->10196 10197 40a073 10196->10197 10198 40e8da ctype 3 API calls 10197->10198 10199 40a080 10198->10199 10200 40e8da ctype 3 API calls 10199->10200 10201 40a088 10200->10201 10202 40e8da ctype 3 API calls 10201->10202 10203 40a095 10202->10203 10204 40e8da ctype 3 API calls 10203->10204 10205 40a09d 10204->10205 10206 40e8da ctype 3 API calls 10205->10206 10207 40a0aa 10206->10207 10208 40e8da ctype 3 API calls 10207->10208 10209 40a0b2 10208->10209 10437 40e8da ctype 3 API calls 10436->10437 10438 40a29c 10437->10438 10454 40f0b6 GetLastError 10453->10454 10456 40b17e 10454->10456 10455 40b192 10455->9987 10456->10455 10457 40adc3 3 API calls 10456->10457 10458 40b1b6 memcpy 10457->10458 10463 40b1d9 10458->10463 10459 40b297 ??3@YAXPAX 10459->10455 10460 40b2a2 ??3@YAXPAX 10460->10455 10462 40b27a memmove 10462->10463 10463->10459 10463->10460 10463->10462 10464 40b2ac memcpy 10463->10464 10465 40dcfb 3 API calls 10464->10465 10465->10460 10467 4012a5 10466->10467 10468 4012b8 10466->10468 10467->10468 10469 4012a7 Sleep 10467->10469 10470 4012f1 10468->10470 10471 4012e3 EndDialog 10468->10471 10469->10467 10471->10470 10473 4021db 10472->10473 10473->9617 10475 4025ae 2 API calls 10474->10475 10476 402992 10475->10476 10477 4029be 10476->10477 10478 402640 2 API calls 10476->10478 10477->9686 10478->10476 10479->9686 10481 4029d2 10480->10481 10482 4029de 10480->10482 10499 4019f0 GetStdHandle WriteFile 10481->10499 10484 4025ae 2 API calls 10482->10484 10488 4029e8 10484->10488 10485 4029d9 10497 402425 ??3@YAXPAX ??3@YAXPAX 10485->10497 10486 402a13 10487 40272e 3 API calls 10486->10487 10489 402a25 10487->10489 10488->10486 10492 402640 2 API calls 10488->10492 10490 402a33 10489->10490 10491 402a47 10489->10491 10493 407776 55 API calls 10490->10493 10494 407776 55 API calls 10491->10494 10492->10488 10495 402a42 ??3@YAXPAX ??3@YAXPAX 10493->10495 10494->10495 10495->10485 10497->9683 10498->9672 10499->10485 10501 4012f7 2 API calls 10500->10501 10502 402676 10501->10502 10503 4012f7 2 API calls 10502->10503 10504 402682 10503->10504 10504->9704 10506 4025ae 2 API calls 10505->10506 10507 402785 10506->10507 10508 4027c1 10507->10508 10511 402628 10507->10511 10508->9731 10512 402634 10511->10512 10513 40263a WideCharToMultiByte 10511->10513 10514 4022b0 2 API calls 10512->10514 10513->10508 10514->10513 10516 407456 10515->10516 10517 40745b 10515->10517 10516->9752 10517->10516 10518 4073d1 21 API calls 10517->10518 10518->10516 10519->9759 10520->9761 10521->9766 10522->9767 10523->9769 10524->9773 10525->9777 10526->9781 10528 40661a 2 API calls 10527->10528 10529 40715c 10528->10529 10529->9789 10533 40716d 10530->10533 10534 40661a 2 API calls 10533->10534 10535 407175 10534->10535 10535->9789 10537 40661a 2 API calls 10536->10537 10538 4071a7 10537->10538 10538->9815 8037 40f3f1 8040 4024e7 8037->8040 8045 40245a 8040->8045 8043 4024f5 8044 4024f6 malloc 8046 40246a 8045->8046 8052 402466 8045->8052 8047 40247a GlobalMemoryStatusEx 8046->8047 8046->8052 8048 402488 8047->8048 8047->8052 8048->8052 8053 401f9d 8048->8053 8052->8043 8052->8044 8057 401fb4 8053->8057 8054 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8055 402095 SetLastError 8054->8055 8056 40201d ??2@YAPAXI GetEnvironmentVariableW 8054->8056 8060 401fdb 8055->8060 8061 4020ac 8055->8061 8058 40207e ??3@YAXPAX 8056->8058 8059 40204c GetLastError 8056->8059 8057->8054 8057->8060 8067 402081 8058->8067 8059->8058 8062 402052 8059->8062 8073 407717 8060->8073 8064 4020cb lstrlenA ??2@YAPAXI 8061->8064 8080 401f47 8061->8080 8062->8067 8068 40205c lstrcmpiW 8062->8068 8065 402136 MultiByteToWideChar 8064->8065 8066 4020fc GetLocaleInfoW 8064->8066 8065->8060 8066->8065 8071 402123 _wtol 8066->8071 8067->8055 8068->8058 8072 40206b ??3@YAXPAX 8068->8072 8070 4020c1 8070->8064 8071->8065 8072->8067 8087 40661a 8073->8087 8076 40774e 8091 4073d1 8076->8091 8077 40773c IsBadReadPtr 8077->8076 8081 401f51 GetUserDefaultUILanguage 8080->8081 8082 401f95 8080->8082 8083 401f72 GetSystemDefaultUILanguage 8081->8083 8084 401f6e 8081->8084 8082->8070 8083->8082 8085 401f7e GetSystemDefaultLCID 8083->8085 8084->8070 8085->8082 8086 401f8e 8085->8086 8086->8082 8088 406643 8087->8088 8089 40666f IsWindow 8087->8089 8088->8089 8090 40664b GetSystemMetrics GetSystemMetrics 8088->8090 8089->8076 8089->8077 8090->8089 8092 4073e0 8091->8092 8093 407444 8091->8093 8092->8093 8103 4024fc 8092->8103 8093->8052 8095 4073f1 8096 4024fc 2 API calls 8095->8096 8097 4073fc 8096->8097 8107 403b7f 8097->8107 8100 403b7f 19 API calls 8101 40740e ??3@YAXPAX ??3@YAXPAX 8100->8101 8101->8093 8104 402513 8103->8104 8116 40112b 8104->8116 8106 40251e 8106->8095 8180 403880 8107->8180 8109 403b59 8121 40393b 8109->8121 8111 403b69 8144 4039f6 8111->8144 8113 403b74 8167 4027c7 8113->8167 8117 401177 8116->8117 8118 401139 ??2@YAPAXI 8116->8118 8117->8106 8118->8117 8120 40115a 8118->8120 8119 40116f ??3@YAXPAX 8119->8117 8120->8119 8120->8120 8203 401411 8121->8203 8125 403954 8210 40254d 8125->8210 8127 403961 8128 4024fc 2 API calls 8127->8128 8129 40396e 8128->8129 8214 403805 8129->8214 8132 401362 2 API calls 8133 403992 8132->8133 8134 40254d 2 API calls 8133->8134 8135 40399f 8134->8135 8136 4024fc 2 API calls 8135->8136 8137 4039ac 8136->8137 8138 403805 3 API calls 8137->8138 8139 4039bc ??3@YAXPAX 8138->8139 8140 4024fc 2 API calls 8139->8140 8141 4039d3 8140->8141 8142 403805 3 API calls 8141->8142 8143 4039e2 ??3@YAXPAX ??3@YAXPAX 8142->8143 8143->8111 8145 401411 2 API calls 8144->8145 8146 403a04 8145->8146 8147 401362 2 API calls 8146->8147 8148 403a0f 8147->8148 8149 40254d 2 API calls 8148->8149 8150 403a1c 8149->8150 8151 4024fc 2 API calls 8150->8151 8152 403a29 8151->8152 8153 403805 3 API calls 8152->8153 8154 403a39 ??3@YAXPAX 8153->8154 8155 401362 2 API calls 8154->8155 8156 403a4d 8155->8156 8157 40254d 2 API calls 8156->8157 8158 403a5a 8157->8158 8159 4024fc 2 API calls 8158->8159 8160 403a67 8159->8160 8161 403805 3 API calls 8160->8161 8162 403a77 ??3@YAXPAX 8161->8162 8163 4024fc 2 API calls 8162->8163 8164 403a8e 8163->8164 8165 403805 3 API calls 8164->8165 8166 403a9d ??3@YAXPAX ??3@YAXPAX 8165->8166 8166->8113 8168 401411 2 API calls 8167->8168 8169 4027d5 8168->8169 8170 4027e5 ExpandEnvironmentStringsW 8169->8170 8171 40112b 2 API calls 8169->8171 8172 402809 8170->8172 8173 4027fe ??3@YAXPAX 8170->8173 8171->8170 8239 402535 8172->8239 8174 402840 8173->8174 8174->8100 8177 402824 8178 401362 2 API calls 8177->8178 8179 402838 ??3@YAXPAX 8178->8179 8179->8174 8181 401411 2 API calls 8180->8181 8182 40388e 8181->8182 8183 401362 2 API calls 8182->8183 8184 403899 8183->8184 8185 40254d 2 API calls 8184->8185 8186 4038a6 8185->8186 8187 4024fc 2 API calls 8186->8187 8188 4038b3 8187->8188 8189 403805 3 API calls 8188->8189 8190 4038c3 ??3@YAXPAX 8189->8190 8191 401362 2 API calls 8190->8191 8192 4038d7 8191->8192 8193 40254d 2 API calls 8192->8193 8194 4038e4 8193->8194 8195 4024fc 2 API calls 8194->8195 8196 4038f1 8195->8196 8197 403805 3 API calls 8196->8197 8198 403901 ??3@YAXPAX 8197->8198 8199 4024fc 2 API calls 8198->8199 8200 403918 8199->8200 8201 403805 3 API calls 8200->8201 8202 403927 ??3@YAXPAX ??3@YAXPAX 8201->8202 8202->8109 8204 40112b 2 API calls 8203->8204 8205 401425 8204->8205 8206 401362 8205->8206 8207 40136e 8206->8207 8209 401380 8206->8209 8208 40112b 2 API calls 8207->8208 8208->8209 8209->8125 8211 40255a 8210->8211 8219 401398 8211->8219 8213 402565 8213->8127 8215 40381b 8214->8215 8216 403817 ??3@YAXPAX 8214->8216 8215->8216 8223 4026b1 8215->8223 8227 402f96 8215->8227 8216->8132 8220 4013dc 8219->8220 8221 4013ac 8219->8221 8220->8213 8222 40112b 2 API calls 8221->8222 8222->8220 8224 4026c7 8223->8224 8225 4026db 8224->8225 8231 402346 memmove 8224->8231 8225->8215 8228 402fa5 8227->8228 8230 402fbe 8228->8230 8232 4026e6 8228->8232 8230->8215 8231->8225 8233 4026f6 8232->8233 8234 401398 2 API calls 8233->8234 8235 402702 8234->8235 8238 402346 memmove 8235->8238 8237 40270f 8237->8230 8238->8237 8240 402541 8239->8240 8241 402547 ExpandEnvironmentStringsW 8239->8241 8242 40112b 2 API calls 8240->8242 8241->8177 8242->8241 11204 40e4f9 11205 40e516 11204->11205 11206 40e506 11204->11206 11209 40de46 11206->11209 11212 401b1f VirtualFree 11209->11212 11211 40de81 ??3@YAXPAX 11211->11205 11212->11211
                                              APIs
                                                • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                                • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                              • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                              • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                                • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                              • _wtol.MSVCRT ref: 0040509F
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                              • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                              • _wtol.MSVCRT ref: 00405217
                                              • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                                • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                                • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                                • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                                • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                                • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                                • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                              • wsprintfW.USER32 ref: 00405595
                                              • _wtol.MSVCRT ref: 004057DE
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                              • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                              • CoInitialize.OLE32(00000000), ref: 004059E9
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                              • GetKeyState.USER32(00000010), ref: 00405AA1
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                              • memset.MSVCRT ref: 004060AE
                                              • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                              • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                                • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                              • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                              • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                              • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                              • _wtol.MSVCRT ref: 00405F65
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                              • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                              • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                              • API String ID: 154539431-3058303289
                                              • Opcode ID: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                                              • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                              • Opcode Fuzzy Hash: 926e16e0d72d3398af4091c0d2fb4f0e89ce66b1218389f87f1cbe10f28a7287
                                              • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 701 4017a2-4017a8 695->701 702 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->702 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 701->704 705 4017aa-4017ad 701->705 702->660 706 4017dc-4017df 704->706 708 4017b6-4017c2 705->708 709 4017af-4017b1 705->709 710 4017e1-4017e3 call 403354 706->710 711 4017f8-4017ff call 40301a 706->711 708->706 709->693 714 4017e8-4017eb 710->714 715 401804-401809 711->715 714->697 716 4017f1-4017f3 714->716 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 744 4018d1-4018d9 739->744 745 4018db-4018f3 call 40db53 739->745 743 40188a-40189a ??3@YAXPAX@Z 740->743 746 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 743->746 747 40189c-40189e 743->747 744->743 753 4018f5-401904 GetLastError 745->753 754 401906-40190e ??3@YAXPAX@Z 745->754 746->660 747->746 753->743 754->729
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                                              • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                              • Opcode Fuzzy Hash: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                                              • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                              • SetLastError.KERNEL32(00000010), ref: 0040303D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: AttributesErrorFileLast
                                              • String ID:
                                              • API String ID: 1799206407-0
                                              • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                              • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                              • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                              • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                              APIs
                                              • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                              • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: DiskFreeMessageSendSpace
                                              • String ID:
                                              • API String ID: 696007252-0
                                              • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                              • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                              • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                              • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                              • String ID: HpA
                                              • API String ID: 801014965-2938899866
                                              • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                              • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                              • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                              • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                              • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                              • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                              • DispatchMessageW.USER32(?), ref: 00401B89
                                              • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                              • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                              • String ID: Static
                                              • API String ID: 2479445380-2272013587
                                              • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                              • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                              • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                              • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                                              APIs
                                              • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                              • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@memcpymemmove
                                              • String ID:
                                              • API String ID: 3549172513-3916222277
                                              • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                              • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                              • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                              • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 852 4033f8-4033fa 838->852 853 403419-40341b 839->853 854 40340a-403417 call 407776 839->854 840->831 848 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->848 849 40347f-40348a 841->849 844->837 845 4033b6 844->845 845->835 865 4034bc-4034c0 848->865 849->848 850 40348c-403490 849->850 850->848 856 403492-403497 850->856 860 40349c-4034a5 ??3@YAXPAX@Z 852->860 857 40346b-403475 ??3@YAXPAX@Z 853->857 858 40341d-40343c memcpy 853->858 854->852 856->848 862 403499-40349b 856->862 857->865 863 403451-403455 858->863 864 40343e 858->864 860->865 862->860 867 403440-403448 863->867 868 403457-403464 call 401986 863->868 866 403450 864->866 866->863 867->868 869 40344a-40344e 867->869 868->854 872 403466-403469 868->872 869->866 869->868 872->857 872->858
                                              APIs
                                              • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                              • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                              • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                              • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                              • String ID:
                                              • API String ID: 846840743-0
                                              • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                              • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                              • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                              • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                                • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                              • wsprintfW.USER32 ref: 004044A7
                                                • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                              • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                              • String ID: 7zSfxFolder%02d$IA
                                              • API String ID: 3387708999-1317665167
                                              • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                              • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                              • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                              • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 924 408f26 923->924 925 408f19-408f24 923->925 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 924->927 925->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 945 409199-4091b0 935->945 946 409019-40901c 935->946 939 409020-409035 call 40e8da call 40874d 936->939 966 408fb0-408fb2 937->966 967 408fb6-408fbb 937->967 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 945->952 953 40934c-409367 call 4087ea 945->953 946->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 968 4090ad-4090b3 955->968 969 40907f 955->969 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 964 409051-409061 call 408726 958->964 959->964 988 409063-409066 964->988 989 409068 964->989 966->967 970 408fc3-408fcf 967->970 971 408fbd-408fbf 967->971 981 409187-409196 call 408e83 968->981 982 4090b9-4090e6 call 40d94b 968->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 969->977 970->922 970->923 971->970 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->968 1016 409261-409264 978->1016 1017 4092c9 978->1017 986 4091f7-409209 979->986 987 4092b9-4092bb 979->987 981->945 1000 409283-409288 982->1000 1001 4090ec-4090f3 982->1001 1002 4093a4-4093b8 call 408761 983->1002 1003 4093ba-4093d6 983->1003 1014 409293-409295 986->1014 1015 40920f-409211 986->1015 1004 4092bf-4092c4 987->1004 996 40906a 988->996 989->996 996->955 1012 409290 1000->1012 1013 40928a-40928c 1000->1013 1008 409121-409124 1001->1008 1009 4090f5-4090f9 1001->1009 1002->1003 1080 4093d7 call 40ce70 1003->1080 1081 4093d7 call 40f160 1003->1081 1004->977 1022 4092b2-4092b7 1008->1022 1023 40912a-409138 call 408726 1008->1023 1009->1008 1018 4090fb-4090fe 1009->1018 1012->1014 1013->1012 1025 409297-409299 1014->1025 1026 40929d-4092a0 1014->1026 1015->978 1024 409213-409215 1015->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->987 1022->1004 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1050 409281 1027->1050 1028->1046 1051 409114-40911f call 40d6cb 1028->1051 1029->1004 1034 4092ac-4092ae 1029->1034 1037 4092d4-4092e0 call 408a55 1030->1037 1038 40931d-409346 call 40e959 * 2 1030->1038 1034->1022 1057 4092e2-4092ec 1037->1057 1058 4092ee-4092fa call 408aa0 1037->1058 1038->953 1038->957 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1050->1030 1051->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1066 409165-409167 1060->1066 1067 40916b-409170 1060->1067 1063->1037 1063->1038 1066->1067 1071 409172-409174 1067->1071 1072 409178-409181 1067->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                              • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID: IA$IA
                                              • API String ID: 1033339047-1400641299
                                              • Opcode ID: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                                              • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                              • Opcode Fuzzy Hash: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                                              • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: $KA$4KA$HKA$\KA
                                              • API String ID: 1294909896-3316857779
                                              • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                              • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                              • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                              • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1121 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1121 1122 40983c-409846 call 409425 1112->1122 1113->1114 1115 409780-409796 call 4094e0 call 40969d call 40e959 1114->1115 1116 4097a3-4097a8 1114->1116 1137 40979b-4097a1 1115->1137 1119 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1116->1119 1120 4097aa-4097b4 1116->1120 1125 4097f3-409809 1119->1125 1120->1119 1120->1125 1133 409881-40989a call 4010e2 call 40eb24 1121->1133 1134 409878-40987f call 40ebf7 1121->1134 1144 40984a-40984c 1122->1144 1130 40980c-409814 1125->1130 1136 409816-409825 call 409403 1130->1136 1130->1137 1154 40989d-4098c0 call 40eb19 1133->1154 1134->1133 1136->1130 1137->1109 1144->1110 1157 4098c2-4098c7 1154->1157 1158 4098f6-4098f9 1154->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1164 409954 1159->1164 1165 40994b-409952 call 409c13 1159->1165 1166 409902-409904 1160->1166 1167 409908-40991e call 409530 call 409425 1160->1167 1161->1162 1180 4098e9-4098eb 1162->1180 1181 4098ef-4098f1 1162->1181 1170 409956-40996d call 4010e2 1164->1170 1165->1170 1166->1167 1167->1159 1182 40997b-4099a0 call 409fb4 1170->1182 1183 40996f-409978 1170->1183 1180->1181 1181->1110 1186 4099a2-4099a7 1182->1186 1187 4099e3-4099e6 1182->1187 1183->1182 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1154 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1226 409aa2-409aa4 1213->1226 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1223 409a73-409a75 1218->1223 1224 409a79-409a91 call 409530 call 409425 1218->1224 1219->1213 1220->1195 1221 409adf-409ae5 1220->1221 1221->1195 1223->1224 1224->1144 1233 409a97-409a9d 1224->1233 1229 409aa6-409aa8 1226->1229 1230 409aac-409ab0 1226->1230 1229->1230 1230->1195 1233->1144
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004096D0
                                              • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                              • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                                • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@$H_prolog
                                              • String ID: HIA
                                              • API String ID: 3431946709-2712174624
                                              • Opcode ID: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                                              • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                              • Opcode Fuzzy Hash: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                                              • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                                              APIs
                                              • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                              • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                              • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                              • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                              • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: lstrlenmemcmp$memmove
                                              • String ID:
                                              • API String ID: 3251180759-0
                                              • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                              • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                              • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                              • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                              • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                                • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                              • String ID:
                                              • API String ID: 359084233-0
                                              • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                              • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                              • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                              • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                              • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                              • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                              • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ErrorLast$AttributesCreateDirectoryFile
                                              • String ID:
                                              • API String ID: 635176117-0
                                              • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                              • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                              • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                              • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000015,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                              • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID: ExecuteFile
                                              • API String ID: 1033339047-323923146
                                              • Opcode ID: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                                              • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                              • Opcode Fuzzy Hash: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                                              • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                              • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@??3@memmove
                                              • String ID:
                                              • API String ID: 3828600508-0
                                              • Opcode ID: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                                              • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                              • Opcode Fuzzy Hash: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                                              • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID: @
                                              • API String ID: 1890195054-2766056989
                                              • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                              • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                              • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                              • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                              APIs
                                                • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                                • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$??2@ExceptionThrowmemmove
                                              • String ID:
                                              • API String ID: 4269121280-0
                                              • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                              • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                              • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                              • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@H_prolog
                                              • String ID:
                                              • API String ID: 1329742358-0
                                              • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                              • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                              • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                              • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@??3@
                                              • String ID:
                                              • API String ID: 1936579350-0
                                              • Opcode ID: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                                              • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                                              • Opcode Fuzzy Hash: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                                              • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022C0
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022E4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@??3@
                                              • String ID:
                                              • API String ID: 1936579350-0
                                              • Opcode ID: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                                              • Instruction ID: 09ebe67ff45b08f81c36141d9c2dc2e417a159b47c448e0a3757dda97e47d19e
                                              • Opcode Fuzzy Hash: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                                              • Instruction Fuzzy Hash: 8CF030351046529FC330DF69C584853F7E4EB59715721887FE1D6D36A2C674A880CB64
                                              APIs
                                              • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                              • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                              • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                              • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                              • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                              APIs
                                              • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                              • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: AllocExceptionStringThrow
                                              • String ID:
                                              • API String ID: 3773818493-0
                                              • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                              • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                              • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                              • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: CriticalSection$EnterLeave
                                              • String ID:
                                              • API String ID: 3168844106-0
                                              • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                              • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                              • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                              • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                              • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                              • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                              • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                              • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                              • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                              • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                              • Instruction ID: 375caa893e42e0daca7b158ffe4b4b415bc54d3572d418f3e5e61c8e5be1c541
                                              • Opcode Fuzzy Hash: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                                              • Instruction Fuzzy Hash: 30F0F272500109BBCF029F85D901AEEBB36EB48354F00811ABA1161160D33A9961AB99
                                              APIs
                                                • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                              • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: CloseCreateFileHandle
                                              • String ID:
                                              • API String ID: 3498533004-0
                                              • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                              • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                              • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                              • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                              APIs
                                              • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                              • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                              • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                              • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                              APIs
                                              • _beginthreadex.MSVCRT ref: 00406552
                                                • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ErrorLast_beginthreadex
                                              • String ID:
                                              • API String ID: 4034172046-0
                                              • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                              • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                              • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                              • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: H_prolog
                                              • String ID:
                                              • API String ID: 3519838083-0
                                              • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                              • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                              • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                              • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                              APIs
                                              • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                              • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                              • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                              • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                              APIs
                                              • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: FileTime
                                              • String ID:
                                              • API String ID: 1425588814-0
                                              • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                              • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                              • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                              • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: memmove
                                              • String ID:
                                              • API String ID: 2162964266-0
                                              • Opcode ID: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                              • Instruction ID: f56dbf57367ec124b55c1fed62106b1dafce564086f6503587e0b0fbfa293862
                                              • Opcode Fuzzy Hash: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                                              • Instruction Fuzzy Hash: EA21A271A00B009FC724CFAAC88485BF7F9FF88724764896EE49A93A40E774B945CB54
                                              APIs
                                              • _CxxThrowException.MSVCRT(?,00414F84), ref: 0040E616
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID:
                                              • API String ID: 432778473-0
                                              • Opcode ID: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                              • Instruction ID: f2b552c6dcb6979234feea5fe890f572eb9d388e9264680fa6f26452196acfb0
                                              • Opcode Fuzzy Hash: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                                              • Instruction Fuzzy Hash: 20017171600701AFDB28CFBAD805997BBF8EF85314704496EE482D3651E374F946CB50
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                              • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                              • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                              • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                              APIs
                                              • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@
                                              • String ID:
                                              • API String ID: 1033339047-0
                                              • Opcode ID: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                                              • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                              • Opcode Fuzzy Hash: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                                              • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                              APIs
                                              • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                              • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                              • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                              • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                              • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                              • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                              • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                              APIs
                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: FreeVirtual
                                              • String ID:
                                              • API String ID: 1263568516-0
                                              • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                              • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                              • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                              • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                              • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                              • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              • _wtol.MSVCRT ref: 004034E5
                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                              • _wtol.MSVCRT ref: 0040367F
                                              • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                              • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                              • String ID: .lnk
                                              • API String ID: 408529070-24824748
                                              • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                              • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                              • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                              • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                              APIs
                                              • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                              • wsprintfW.USER32 ref: 00401FFD
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                              • GetLastError.KERNEL32 ref: 00402017
                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                              • GetLastError.KERNEL32 ref: 0040204C
                                              • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                              • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                              • SetLastError.KERNEL32(00000000), ref: 00402098
                                              • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                              • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                              • _wtol.MSVCRT ref: 0040212A
                                              • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                              • String ID: 7zSfxString%d$XpA$\3A
                                              • API String ID: 2117570002-3108448011
                                              • Opcode ID: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                                              • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                              • Opcode Fuzzy Hash: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                                              • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                              • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                              • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                              • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                              • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                              • LockResource.KERNEL32(00000000), ref: 00401C41
                                              • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                              • wsprintfW.USER32 ref: 00401C95
                                              • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                              • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                              • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                              • API String ID: 2639302590-365843014
                                              • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                              • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                              • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                              • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                              APIs
                                              • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                              • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                              • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                              • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                              • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                              • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                              • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                              • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                              • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                              • String ID:
                                              • API String ID: 829399097-0
                                              • Opcode ID: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                                              • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                              • Opcode Fuzzy Hash: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                                              • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                              • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                              • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                              • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                              • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                              • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                              • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                              • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                              • String ID:
                                              • API String ID: 1862581289-0
                                              • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                              • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                              • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                              • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                              APIs
                                              • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                              • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                              • GetWindow.USER32(?,00000005), ref: 00406D8F
                                              • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Window$AddressLibraryLoadProc
                                              • String ID: SetWindowTheme$\EA$uxtheme
                                              • API String ID: 324724604-1613512829
                                              • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                              • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                              • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                              • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                              • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                              • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                              • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                              • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                              • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                              • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                              • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                              • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                              • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                              • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                              • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                              • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                              APIs
                                              • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                              • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                              • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                              • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                              • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                              • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                              • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                              • API String ID: 3007203151-3467708659
                                              • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                              • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                              • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                              • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                              APIs
                                              • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                              • _wtol.MSVCRT ref: 004047DC
                                              • _wtol.MSVCRT ref: 004047F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                              • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                              • API String ID: 2725485552-3187639848
                                              • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                              • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                              • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                              • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                              APIs
                                              • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,7591E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                              • GetParent.USER32(?), ref: 00402E2E
                                              • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                              • GetMenu.USER32(?), ref: 00402E55
                                              • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                              • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                              • DestroyWindow.USER32(?), ref: 00402EA3
                                              • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                              • GetSysColor.USER32(0000000F), ref: 00402EBC
                                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                              • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                              • String ID: RichEdit20W$STATIC$riched20${\rtf
                                              • API String ID: 1731037045-2281146334
                                              • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                              • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                              • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                              • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                              APIs
                                              • GetWindowDC.USER32(00000000), ref: 00401CD4
                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                              • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                              • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                              • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                              • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                              • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                              • SelectObject.GDI32(00000000,?), ref: 00401D60
                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                              • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                              • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                              • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                              • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                              • DeleteDC.GDI32(00000000), ref: 00401DC2
                                              • DeleteDC.GDI32(00000000), ref: 00401DC5
                                              • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                              • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                              • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                              • String ID:
                                              • API String ID: 3462224810-0
                                              • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                              • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                              • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                              • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                              APIs
                                              • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                              • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                              • GetMenu.USER32(?), ref: 00401E44
                                                • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                              • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                              • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                              • CoInitialize.OLE32(00000000), ref: 00401E8C
                                              • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                              • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                                • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                                • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                                • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                                • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                                • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                              • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                              • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                              • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                              • String ID: IMAGES$STATIC
                                              • API String ID: 4202116410-1168396491
                                              • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                              • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                              • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                              • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                              APIs
                                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                              • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                              • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                              • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                              • SetWindowLongW.USER32(00000000), ref: 004081D8
                                              • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                              • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                              • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                              • SetFocus.USER32(00000000), ref: 0040821D
                                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                              • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                              • GetDlgItem.USER32(?,00000002), ref: 00408294
                                              • IsWindow.USER32(00000000), ref: 00408297
                                              • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                              • EnableWindow.USER32(00000000), ref: 004082AA
                                              • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                              • ShowWindow.USER32(00000000), ref: 004082C1
                                                • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                                • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                                • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                              • String ID:
                                              • API String ID: 855516470-0
                                              • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                              • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                              • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                              • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                              • strncmp.MSVCRT ref: 004031F1
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                              • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                              • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$lstrcmpstrncmp
                                              • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                              • API String ID: 2881732429-172299233
                                              • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                              • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                              • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                              • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                              APIs
                                              • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                              • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                              • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                              • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                              • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                              • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                              • GetParent.USER32(?), ref: 00406B43
                                              • GetClientRect.USER32(00000000,?), ref: 00406B55
                                              • ClientToScreen.USER32(?,?), ref: 00406B68
                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                              • GetClientRect.USER32(?,?), ref: 00406C55
                                              • ClientToScreen.USER32(?,?), ref: 00406B71
                                                • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                              • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                              • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                                • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                                • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                              • String ID:
                                              • API String ID: 747815384-0
                                              • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                              • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                              • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                              • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                              • LoadIconW.USER32(00000000), ref: 00407D33
                                              • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                              • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                              • LoadImageW.USER32(00000000), ref: 00407D54
                                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                              • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                              • GetWindow.USER32(?,00000005), ref: 00407E76
                                              • GetWindow.USER32(?,00000005), ref: 00407E92
                                              • GetWindow.USER32(?,00000005), ref: 00407EAA
                                              • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                              • LoadIconW.USER32(00000000), ref: 00407F0D
                                              • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                              • SendMessageW.USER32(00000000), ref: 00407F2F
                                                • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                              • String ID:
                                              • API String ID: 1889686859-0
                                              • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                              • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                              • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                              • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                              APIs
                                              • GetParent.USER32(?), ref: 00406F45
                                              • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                              • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                              • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                              • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                              • GetWindowDC.USER32(?), ref: 00406FAA
                                              • GetWindowRect.USER32(?,?), ref: 00406FB7
                                              • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                              • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                              • String ID:
                                              • API String ID: 2586545124-0
                                              • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                              • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                              • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                              • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                              APIs
                                              • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                              • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                              • GetDlgItem.USER32(?,?), ref: 004067CC
                                              • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                              • GetDlgItem.USER32(?,?), ref: 004067DD
                                              • SetFocus.USER32(00000000,?,000004B4,75920E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ItemMessageSend$Focus
                                              • String ID:
                                              • API String ID: 3946207451-0
                                              • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                              • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                              • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                              • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: IA$IA$IA$IA$IA$IA
                                              • API String ID: 613200358-3743982587
                                              • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                              • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                              • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                              • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                              • API String ID: 613200358-994561823
                                              • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                              • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                              • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                              • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                              APIs
                                              • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                              • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                              • GetDC.USER32(00000000), ref: 00406DFB
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                              • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                              • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                              • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                              • String ID:
                                              • API String ID: 2693764856-0
                                              • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                              • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                              • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                              • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                              APIs
                                              • GetDC.USER32(?), ref: 0040696E
                                              • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                              • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                              • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                              • SelectObject.GDI32(?,?), ref: 004069B8
                                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                              • SelectObject.GDI32(?,?), ref: 004069F9
                                              • ReleaseDC.USER32(?,?), ref: 00406A08
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                              • String ID:
                                              • API String ID: 2466489532-0
                                              • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                              • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                              • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                              • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                              APIs
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                              • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                              • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                              • wsprintfW.USER32 ref: 00407BBB
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                              • String ID: %d%%
                                              • API String ID: 3753976982-1518462796
                                              • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                              • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                              • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                              • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                              APIs
                                              • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,7591E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$CharUpper$lstrlen
                                              • String ID: hAA
                                              • API String ID: 2587799592-1362906312
                                              • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                              • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                              • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                              • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                                • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                              • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                              • API String ID: 4038993085-2279431206
                                              • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                              • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                              • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                              • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                              APIs
                                              • EndDialog.USER32(?,00000000), ref: 00407579
                                              • KillTimer.USER32(?,00000001), ref: 0040758A
                                              • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                              • SuspendThread.KERNEL32(00000290), ref: 004075CD
                                              • ResumeThread.KERNEL32(00000290), ref: 004075EA
                                              • EndDialog.USER32(?,00000000), ref: 0040760C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: DialogThreadTimer$KillResumeSuspend
                                              • String ID:
                                              • API String ID: 4151135813-0
                                              • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                              • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                              • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                              • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                              • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                              • wsprintfA.USER32 ref: 00404EBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$wsprintf
                                              • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                              • API String ID: 2704270482-1550708412
                                              • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                              • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                              • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                              • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                              • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%T/$%%T\
                                              • API String ID: 613200358-2679640699
                                              • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                              • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                              • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                              • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%S/$%%S\
                                              • API String ID: 613200358-358529586
                                              • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                              • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                              • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                              • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                              • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@
                                              • String ID: %%M/$%%M\
                                              • API String ID: 613200358-4143866494
                                              • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                              • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                              • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                              • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                              APIs
                                              • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                              • API String ID: 432778473-803145960
                                              • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                              • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                              • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                              • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                              APIs
                                                • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                                • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@$??3@$memmove
                                              • String ID: IA$IA$IA
                                              • API String ID: 4294387087-924693538
                                              • Opcode ID: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                                              • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                              • Opcode Fuzzy Hash: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                                              • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                              APIs
                                              • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                              • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                              • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                              • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??2@??3@ExceptionThrowmemcpy
                                              • String ID: IA
                                              • API String ID: 3462485524-3293647318
                                              • Opcode ID: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                                              • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                              • Opcode Fuzzy Hash: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                                              • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: wsprintf$ExitProcesslstrcat
                                              • String ID: 0x%p
                                              • API String ID: 2530384128-1745605757
                                              • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                              • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                              • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                              • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                              APIs
                                                • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                                • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                              • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                              • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                              • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: MetricsSystem$??3@
                                              • String ID: 100%%
                                              • API String ID: 2562992111-568723177
                                              • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                              • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                              • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                              • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                              APIs
                                              • wsprintfW.USER32 ref: 00407A12
                                                • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                              • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: TextWindow$ItemLength$??3@wsprintf
                                              • String ID: (%u%s)
                                              • API String ID: 3595513934-2496177969
                                              • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                              • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                              • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                              • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                              • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: GetNativeSystemInfo$kernel32
                                              • API String ID: 2574300362-3846845290
                                              • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                              • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                              • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                              • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                              • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64RevertWow64FsRedirection$kernel32
                                              • API String ID: 2574300362-3900151262
                                              • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                              • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                              • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                              • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                              APIs
                                              • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                              • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: Wow64DisableWow64FsRedirection$kernel32
                                              • API String ID: 2574300362-736604160
                                              • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                              • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                              • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                              • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                              APIs
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 1731127917-0
                                              • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                              • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                              • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                              • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                              APIs
                                              • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                              • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                              • wsprintfW.USER32 ref: 00403FFB
                                              • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: PathTemp$AttributesFilewsprintf
                                              • String ID:
                                              • API String ID: 1746483863-0
                                              • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                              • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                              • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                              • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                              APIs
                                              • CharUpperW.USER32(?,7591E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                              • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: CharUpper
                                              • String ID:
                                              • API String ID: 9403516-0
                                              • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                              • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                              • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                              • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                              APIs
                                                • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                              • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                              • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                              • String ID:
                                              • API String ID: 2538916108-0
                                              • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                              • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                              • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                              • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                              APIs
                                              • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                              • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                              • CreateFontIndirectW.GDI32(?), ref: 00406849
                                              • DeleteObject.GDI32(00000000), ref: 00406878
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                              • String ID:
                                              • API String ID: 1900162674-0
                                              • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                              • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                              • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                              • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                              APIs
                                              • memset.MSVCRT ref: 0040749F
                                              • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                              • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                              • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                                • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                              • String ID:
                                              • API String ID: 1557639607-0
                                              • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                              • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                              • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                              • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                              APIs
                                              • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                              • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@$EnvironmentExpandStrings$??2@
                                              • String ID:
                                              • API String ID: 612612615-0
                                              • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                              • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                              • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                              • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                              APIs
                                                • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                              • SetWindowTextW.USER32(?,?), ref: 00403B12
                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ??3@TextWindow$Length
                                              • String ID:
                                              • API String ID: 2308334395-0
                                              • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                              • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                              • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                              • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                              APIs
                                              • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                              • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                              • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                              • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: CreateFontIndirectItemMessageObjectSend
                                              • String ID:
                                              • API String ID: 2001801573-0
                                              • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                              • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                              • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                              • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                              APIs
                                              • GetParent.USER32(?), ref: 00401BA8
                                              • GetWindowRect.USER32(?,?), ref: 00401BC1
                                              • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                              • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: ClientScreen$ParentRectWindow
                                              • String ID:
                                              • API String ID: 2099118873-0
                                              • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                              • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                              • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                              • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: _wtol
                                              • String ID: GUIFlags$[G@
                                              • API String ID: 2131799477-2126219683
                                              • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                              • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                              • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                              • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                                              APIs
                                              • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                              • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2139893085.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2139879874.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139910404.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139924555.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2139946633.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_8R2YjBA8nI.jbxd
                                              Similarity
                                              • API ID: EnvironmentVariable
                                              • String ID: ?O@
                                              • API String ID: 1431749950-3511380453
                                              • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                              • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                              • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                              • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                                              Execution Graph

                                              Execution Coverage:6.3%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:8.6%
                                              Total number of Nodes:1192
                                              Total number of Limit Nodes:19
                                              execution_graph 23306 6c33a8b0 23307 6c33a930 _Yarn 23306->23307 23309 6c33a8cd _Yarn 23306->23309 23308 6c33aa4b 23308->23307 23312 6c354922 23308->23312 23309->23307 23309->23308 23310 6c354922 __fread_nolock 45 API calls 23309->23310 23310->23309 23315 6c354885 23312->23315 23316 6c354891 ___scrt_is_nonwritable_in_current_image 23315->23316 23317 6c3548db 23316->23317 23319 6c3548a4 __fread_nolock 23316->23319 23327 6c3548c9 23316->23327 23328 6c3500a9 EnterCriticalSection 23317->23328 23343 6c352f04 14 API calls __dosmaperr 23319->23343 23320 6c3548e5 23329 6c35493f 23320->23329 23323 6c3548be 23344 6c353a4e 29 API calls __wsopen_s 23323->23344 23327->23307 23328->23320 23330 6c354951 __fread_nolock 23329->23330 23334 6c3548fc 23329->23334 23331 6c35495e 23330->23331 23330->23334 23337 6c3549af 23330->23337 23367 6c352f04 14 API calls __dosmaperr 23331->23367 23345 6c35491a LeaveCriticalSection __fread_nolock 23334->23345 23336 6c354ada __fread_nolock 23444 6c352f04 14 API calls __dosmaperr 23336->23444 23337->23334 23337->23336 23346 6c361ceb 23337->23346 23369 6c354804 29 API calls 4 library calls 23337->23369 23370 6c35f3a2 23337->23370 23377 6c3621f6 23337->23377 23341 6c354963 23368 6c353a4e 29 API calls __wsopen_s 23341->23368 23343->23323 23344->23327 23345->23327 23347 6c361cf6 23346->23347 23348 6c361d03 23347->23348 23352 6c361d1b 23347->23352 23475 6c352f04 14 API calls __dosmaperr 23348->23475 23350 6c361d08 23476 6c353a4e 29 API calls __wsopen_s 23350->23476 23353 6c361d7a 23352->23353 23361 6c361d13 23352->23361 23477 6c363cff 23352->23477 23354 6c35f3a2 __fread_nolock 29 API calls 23353->23354 23356 6c361d93 23354->23356 23445 6c3620dd 23356->23445 23359 6c35f3a2 __fread_nolock 29 API calls 23360 6c361dcc 23359->23360 23360->23361 23362 6c35f3a2 __fread_nolock 29 API calls 23360->23362 23361->23337 23363 6c361dda 23362->23363 23363->23361 23364 6c35f3a2 __fread_nolock 29 API calls 23363->23364 23365 6c361de8 23364->23365 23366 6c35f3a2 __fread_nolock 29 API calls 23365->23366 23366->23361 23367->23341 23368->23334 23369->23337 23371 6c35f3c3 23370->23371 23372 6c35f3ae 23370->23372 23371->23337 23503 6c352f04 14 API calls __dosmaperr 23372->23503 23374 6c35f3b3 23504 6c353a4e 29 API calls __wsopen_s 23374->23504 23376 6c35f3be 23376->23337 23378 6c362220 23377->23378 23379 6c362208 23377->23379 23381 6c362562 23378->23381 23386 6c362263 23378->23386 23514 6c352f17 14 API calls __dosmaperr 23379->23514 23533 6c352f17 14 API calls __dosmaperr 23381->23533 23382 6c36220d 23515 6c352f04 14 API calls __dosmaperr 23382->23515 23385 6c362567 23534 6c352f04 14 API calls __dosmaperr 23385->23534 23387 6c362215 23386->23387 23389 6c36226e 23386->23389 23393 6c36229e 23386->23393 23387->23337 23516 6c352f17 14 API calls __dosmaperr 23389->23516 23390 6c36227b 23535 6c353a4e 29 API calls __wsopen_s 23390->23535 23392 6c362273 23517 6c352f04 14 API calls __dosmaperr 23392->23517 23396 6c3622b7 23393->23396 23397 6c3622c4 23393->23397 23398 6c3622f2 23393->23398 23396->23397 23403 6c3622e0 23396->23403 23518 6c352f17 14 API calls __dosmaperr 23397->23518 23521 6c35a641 15 API calls 2 library calls 23398->23521 23402 6c3622c9 23519 6c352f04 14 API calls __dosmaperr 23402->23519 23505 6c3671c6 23403->23505 23404 6c362303 23522 6c35a607 14 API calls __dosmaperr 23404->23522 23408 6c3622d0 23520 6c353a4e 29 API calls __wsopen_s 23408->23520 23409 6c36243e 23412 6c3624b2 23409->23412 23415 6c362457 GetConsoleMode 23409->23415 23410 6c36230c 23523 6c35a607 14 API calls __dosmaperr 23410->23523 23414 6c3624b6 ReadFile 23412->23414 23417 6c3624ce 23414->23417 23418 6c36252a GetLastError 23414->23418 23415->23412 23419 6c362468 23415->23419 23416 6c362313 23420 6c36231d 23416->23420 23421 6c362338 23416->23421 23417->23418 23424 6c3624a7 23417->23424 23422 6c362537 23418->23422 23423 6c36248e 23418->23423 23419->23414 23425 6c36246e ReadConsoleW 23419->23425 23524 6c352f04 14 API calls __dosmaperr 23420->23524 23526 6c35fcdb 31 API calls 2 library calls 23421->23526 23531 6c352f04 14 API calls __dosmaperr 23422->23531 23441 6c3622db __fread_nolock 23423->23441 23527 6c352f2a 14 API calls __dosmaperr 23423->23527 23437 6c3624f3 23424->23437 23438 6c36250a 23424->23438 23424->23441 23425->23424 23430 6c362488 GetLastError 23425->23430 23430->23423 23432 6c362322 23525 6c352f17 14 API calls __dosmaperr 23432->23525 23433 6c36253c 23532 6c352f17 14 API calls __dosmaperr 23433->23532 23434 6c362346 23434->23403 23529 6c3625ff 34 API calls 3 library calls 23437->23529 23439 6c362523 23438->23439 23438->23441 23530 6c3628a3 32 API calls __fread_nolock 23439->23530 23528 6c35a607 14 API calls __dosmaperr 23441->23528 23443 6c36232d 23443->23441 23444->23341 23446 6c3620e9 ___scrt_is_nonwritable_in_current_image 23445->23446 23447 6c3620f1 23446->23447 23451 6c36210c 23446->23451 23483 6c352f17 14 API calls __dosmaperr 23447->23483 23449 6c3620f6 23484 6c352f04 14 API calls __dosmaperr 23449->23484 23450 6c362123 23485 6c352f17 14 API calls __dosmaperr 23450->23485 23451->23450 23454 6c36215e 23451->23454 23455 6c362167 23454->23455 23456 6c36217c 23454->23456 23488 6c352f17 14 API calls __dosmaperr 23455->23488 23482 6c367171 EnterCriticalSection 23456->23482 23457 6c362128 23486 6c352f04 14 API calls __dosmaperr 23457->23486 23461 6c36216c 23489 6c352f04 14 API calls __dosmaperr 23461->23489 23462 6c362182 23465 6c3621b6 23462->23465 23466 6c3621a1 23462->23466 23463 6c362130 23487 6c353a4e 29 API calls __wsopen_s 23463->23487 23469 6c3621f6 __fread_nolock 41 API calls 23465->23469 23490 6c352f04 14 API calls __dosmaperr 23466->23490 23471 6c3621b1 23469->23471 23470 6c3621a6 23491 6c352f17 14 API calls __dosmaperr 23470->23491 23492 6c3621ee LeaveCriticalSection __wsopen_s 23471->23492 23474 6c361d9b 23474->23359 23474->23361 23475->23350 23476->23361 23493 6c35cf6f 23477->23493 23481 6c363d26 23481->23353 23482->23462 23483->23449 23484->23474 23485->23457 23486->23463 23487->23474 23488->23461 23489->23463 23490->23470 23491->23471 23492->23474 23498 6c35cf7c __Getctype 23493->23498 23494 6c35cfbc 23502 6c352f04 14 API calls __dosmaperr 23494->23502 23495 6c35cfa7 RtlAllocateHeap 23496 6c35cfba 23495->23496 23495->23498 23500 6c35a607 14 API calls __dosmaperr 23496->23500 23498->23494 23498->23495 23501 6c3524cf EnterCriticalSection LeaveCriticalSection __Getctype 23498->23501 23500->23481 23501->23498 23502->23496 23503->23374 23504->23376 23506 6c3671d3 23505->23506 23507 6c3671e0 23505->23507 23536 6c352f04 14 API calls __dosmaperr 23506->23536 23510 6c3671ec 23507->23510 23537 6c352f04 14 API calls __dosmaperr 23507->23537 23509 6c3671d8 23509->23409 23510->23409 23512 6c36720d 23538 6c353a4e 29 API calls __wsopen_s 23512->23538 23514->23382 23515->23387 23516->23392 23517->23390 23518->23402 23519->23408 23520->23441 23521->23404 23522->23410 23523->23416 23524->23432 23525->23443 23526->23434 23527->23441 23528->23387 23529->23441 23530->23443 23531->23433 23532->23441 23533->23385 23534->23390 23535->23387 23536->23509 23537->23512 23538->23509 23539 6c33aa90 23540 6c33aab3 _Yarn 23539->23540 23541 6c33ab8d _Yarn 23539->23541 23541->23540 23543 6c354c68 23541->23543 23544 6c354c7b __wsopen_s 23543->23544 23547 6c354e49 23544->23547 23546 6c354c90 __wsopen_s 23546->23540 23548 6c354e57 23547->23548 23549 6c354e7f 23547->23549 23548->23549 23550 6c354e64 23548->23550 23551 6c354e86 23548->23551 23549->23546 23563 6c353bf7 29 API calls 2 library calls 23550->23563 23555 6c354f0c 23551->23555 23556 6c354f18 ___scrt_is_nonwritable_in_current_image 23555->23556 23564 6c3500a9 EnterCriticalSection 23556->23564 23558 6c354f26 23565 6c354ec0 23558->23565 23562 6c354ebe 23562->23546 23563->23549 23564->23558 23573 6c35e39a 23565->23573 23571 6c354f02 23572 6c354f5b LeaveCriticalSection __fread_nolock 23571->23572 23572->23562 23593 6c35e445 23573->23593 23575 6c354ed8 23582 6c354ca2 23575->23582 23576 6c35e3ab 23576->23575 23577 6c35e3fa 23576->23577 23600 6c35a641 15 API calls 2 library calls 23577->23600 23579 6c35e404 23601 6c35a607 14 API calls __dosmaperr 23579->23601 23581 6c35e40d 23581->23575 23584 6c354cb4 23582->23584 23587 6c354cdd 23582->23587 23583 6c354cc2 23615 6c353bf7 29 API calls 2 library calls 23583->23615 23584->23583 23584->23587 23590 6c354cf8 _Yarn 23584->23590 23592 6c35e483 64 API calls ___scrt_uninitialize_crt 23587->23592 23589 6c35f3a2 __fread_nolock 29 API calls 23589->23590 23590->23587 23590->23589 23602 6c361e85 23590->23602 23616 6c35421d 23590->23616 23622 6c361438 64 API calls 3 library calls 23590->23622 23592->23571 23594 6c35e451 23593->23594 23595 6c35e47b 23594->23595 23596 6c35f3a2 __fread_nolock 29 API calls 23594->23596 23595->23576 23597 6c35e46c 23596->23597 23598 6c3671c6 __fread_nolock 29 API calls 23597->23598 23599 6c35e472 23598->23599 23599->23576 23600->23579 23601->23581 23603 6c361f15 23602->23603 23604 6c35f3a2 __fread_nolock 29 API calls 23603->23604 23606 6c361f22 23604->23606 23605 6c361f2e 23605->23590 23606->23605 23607 6c361f7a 23606->23607 23623 6c361e90 31 API calls __wsopen_s 23606->23623 23607->23605 23610 6c35e445 29 API calls 23607->23610 23614 6c361fdc 23607->23614 23612 6c361fcf 23610->23612 23611 6c361fed 23611->23590 23613 6c363cff __fread_nolock 14 API calls 23612->23613 23612->23614 23613->23614 23624 6c36200b 64 API calls 2 library calls 23614->23624 23615->23587 23617 6c354236 23616->23617 23621 6c35425d 23616->23621 23618 6c35f3a2 __fread_nolock 29 API calls 23617->23618 23617->23621 23619 6c354252 23618->23619 23625 6c361438 64 API calls 3 library calls 23619->23625 23621->23590 23622->23590 23623->23607 23624->23611 23625->23621 23626 1310e0 23627 1310ec ___scrt_is_nonwritable_in_current_image 23626->23627 23650 1312dc 23627->23650 23629 1310f3 23630 131246 23629->23630 23634 13111d 23629->23634 23668 1315d0 6 API calls 23630->23668 23632 13124d exit 23633 131253 _exit 23632->23633 23635 131121 _initterm_e 23634->23635 23638 13116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23634->23638 23636 13114d _initterm 23635->23636 23637 13113c 23635->23637 23636->23638 23639 1311be 23638->23639 23642 1311b6 _register_thread_local_exe_atexit_callback 23638->23642 23654 1316eb memset GetStartupInfoW 23639->23654 23641 1311c3 _get_narrow_winmain_command_line 23655 131c50 GetCommandLineW CommandLineToArgvW 23641->23655 23642->23639 23644 1311d8 23667 131721 GetModuleHandleW 23644->23667 23646 1311df 23646->23632 23647 1311e3 23646->23647 23648 1311e7 _cexit 23647->23648 23649 1311ec ___scrt_uninitialize_crt 23647->23649 23648->23649 23649->23637 23651 1312e5 23650->23651 23669 1318a4 IsProcessorFeaturePresent 23651->23669 23653 1312f1 ___scrt_uninitialize_crt 23653->23629 23654->23641 23656 131c82 23655->23656 23657 131c78 23655->23657 23670 131d6f 23656->23670 23657->23644 23659 131ca0 23660 131d1c LocalFree 23659->23660 23661 131cc1 WideCharToMultiByte 23659->23661 23680 131000 TCGamerUpdateMain 23660->23680 23663 131d6f 4 API calls 23661->23663 23664 131ce1 WideCharToMultiByte 23663->23664 23664->23661 23665 131d14 23664->23665 23665->23660 23666 131d35 23666->23644 23667->23646 23668->23632 23669->23653 23671 131d7d 23670->23671 23672 131d8f malloc 23671->23672 23673 131d82 _callnewh 23672->23673 23674 131d9c 23672->23674 23673->23672 23675 131d9e 23673->23675 23674->23659 23676 131e9f 23675->23676 23679 131e90 _CxxThrowException 23675->23679 23677 131ead _CxxThrowException 23676->23677 23678 131ec3 23677->23678 23678->23659 23679->23676 23680->23666 23681 6c349b10 23729 6c331a30 23681->23729 23683 6c349b45 23751 6c3493e0 GetModuleFileNameA 23683->23751 23685 6c349b5b _strlen 23686 6c349bae _Yarn 23685->23686 23859 6c332c20 39 API calls 3 library calls 23685->23859 23774 6c347590 23686->23774 23689 6c349f77 23869 6c353a5e 23689->23869 23691 6c349c0b std::ios_base::_Ios_base_dtor 23691->23689 23723 6c349da2 std::ios_base::_Ios_base_dtor 23691->23723 23803 6c347eb0 23691->23803 23692 6c349e27 CreateThread 23696 6c349e40 WaitForSingleObject 23692->23696 23697 6c349eb3 23692->23697 24806 6c3480e0 Sleep 23692->24806 23694 6c349cbd 23700 6c3493e0 31 API calls 23694->23700 23696->23697 23702 6c349e55 CloseHandle 23696->23702 23861 6c3496a0 31 API calls 3 library calls 23697->23861 23699 6c349dfd CreateThread 23699->23692 23712 6c349cc9 _strlen 23700->23712 23706 6c349e64 23702->23706 23709 6c349e83 std::ios_base::_Ios_base_dtor 23702->23709 23706->23689 23706->23709 23707 6c349ed8 23862 6c3492f0 31 API calls 2 library calls 23707->23862 23710 6c349eeb 23863 6c346410 30 API calls 3 library calls 23710->23863 23720 6c349d0b std::ios_base::_Ios_base_dtor _Yarn 23712->23720 23860 6c332c20 39 API calls 3 library calls 23712->23860 23713 6c349f04 23864 6c3499f0 32 API calls 3 library calls 23713->23864 23716 6c349f1e 23865 6c3329d0 29 API calls 2 library calls 23716->23865 23719 6c349f2c 23866 6c337e80 141 API calls 3 library calls 23719->23866 23720->23689 23811 6c355185 23720->23811 23722 6c349f47 23867 6c348000 126 API calls 2 library calls 23722->23867 23723->23689 23723->23692 23824 6c348a70 23723->23824 23725 6c349f53 CreateThread 23868 6c346840 WSAStartup 23725->23868 23874 6c353ef1 GetSystemTimeAsFileTime 23729->23874 23731 6c331a64 23876 6c355147 23731->23876 23736 6c355159 39 API calls 23737 6c331abf 23736->23737 23882 6c331c70 23737->23882 23740 6c331b78 23741 6c331bb4 std::ios_base::_Ios_base_dtor 23740->23741 23743 6c353a5e 29 API calls 23740->23743 23741->23683 23744 6c331bdb 23743->23744 23945 6c331c00 29 API calls std::ios_base::_Ios_base_dtor 23744->23945 23748 6c331b67 Sleep 23748->23740 23750 6c331b08 23748->23750 23749 6c331bef 23749->23683 23750->23740 23895 6c331000 23750->23895 23913 6c3533d3 23750->23913 23921 6c3318c0 23750->23921 23944 6c353423 29 API calls 2 library calls 23750->23944 23752 6c34943f _strlen 23751->23752 23753 6c34965e 23752->23753 23754 6c34944a 23752->23754 24066 6c3326c0 30 API calls 3 library calls 23753->24066 23757 6c3494ac 23754->23757 23758 6c349488 23754->23758 23762 6c349451 _Yarn 23754->23762 23756 6c349663 24067 6c3326c0 30 API calls 3 library calls 23756->24067 23761 6c34aa0e 3 API calls 23757->23761 23760 6c34aa0e 3 API calls 23758->23760 23760->23762 23761->23762 23762->23756 23768 6c34954a 23762->23768 23769 6c34954f _Yarn 23762->23769 23763 6c353a5e 29 API calls 23764 6c349674 23763->23764 24068 6c3329d0 29 API calls 2 library calls 23764->24068 23766 6c34968f 23766->23685 23767 6c34958c std::ios_base::_Ios_base_dtor 23767->23685 23768->23769 23770 6c3495de 23768->23770 23771 6c3495be 23768->23771 23769->23763 23769->23767 23773 6c34aa0e 3 API calls 23770->23773 23772 6c34aa0e 3 API calls 23771->23772 23772->23769 23773->23769 23775 6c3475e4 23774->23775 24069 6c33c580 23775->24069 23777 6c3475f8 23802 6c347697 std::ios_base::_Ios_base_dtor 23777->23802 24088 6c347880 23777->24088 23782 6c3477de std::ios_base::_Ios_base_dtor 23782->23691 23784 6c347671 23788 6c3476e4 23784->23788 23789 6c3476cb 23784->23789 23794 6c347676 __fread_nolock 23784->23794 23785 6c347812 24131 6c3326c0 30 API calls 3 library calls 23785->24131 23787 6c347817 23792 6c353a5e 29 API calls 23787->23792 23791 6c34aa0e 3 API calls 23788->23791 23790 6c34aa0e 3 API calls 23789->23790 23790->23794 23791->23794 23793 6c34781c 23792->23793 24132 6c33a050 72 API calls std::ios_base::_Ios_base_dtor 23793->24132 24113 6c347ca0 75 API calls CallUnexpected 23794->24113 23796 6c347838 23796->23691 23798 6c34773c 23799 6c347799 23798->23799 23800 6c34774b 23798->23800 24114 6c339b70 23799->24114 23800->23787 23800->23802 24130 6c33a100 72 API calls 23802->24130 24631 6c336eb0 23803->24631 23805 6c347f15 std::ios_base::_Ios_base_dtor 23806 6c353a5e 29 API calls 23805->23806 23807 6c347fae std::ios_base::_Ios_base_dtor 23805->23807 23808 6c347fdc 23806->23808 23807->23694 24680 6c3329d0 29 API calls 2 library calls 23808->24680 23810 6c347fef 23810->23694 23812 6c355193 23811->23812 23813 6c35519d 23811->23813 23814 6c36357e 16 API calls 23812->23814 23815 6c3551ef __wsopen_s 39 API calls 23813->23815 23816 6c35519a 23814->23816 23817 6c3551b7 23815->23817 23816->23723 23818 6c34f7f4 __wsopen_s 17 API calls 23817->23818 23819 6c3551c4 23818->23819 23820 6c3551cb 23819->23820 24779 6c36357e DeleteFileW 23819->24779 23822 6c3551e9 23820->23822 24784 6c35a607 14 API calls __dosmaperr 23820->24784 23822->23723 24786 6c346110 23824->24786 23826 6c348b24 23829 6c348b70 std::ios_base::_Ios_base_dtor _Yarn 23826->23829 24797 6c332c20 39 API calls 3 library calls 23826->24797 23828 6c353a5e 29 API calls 23830 6c3491ef 23828->23830 23831 6c348cd1 GetFileAttributesA 23829->23831 23833 6c349163 std::ios_base::_Ios_base_dtor 23829->23833 24801 6c3326c0 30 API calls 3 library calls 23830->24801 23831->23833 23834 6c348ce1 SHGetFolderPathA 23831->23834 23833->23828 23836 6c3491c5 std::ios_base::_Ios_base_dtor 23833->23836 23834->23833 23839 6c348cfd _strlen 23834->23839 23835 6c3491fb 24802 6c3329d0 29 API calls 2 library calls 23835->24802 23836->23699 23838 6c349212 23838->23699 23839->23830 23840 6c348d8d 23839->23840 23841 6c348d6e 23839->23841 23844 6c348d2a _Yarn 23839->23844 23843 6c34aa0e 3 API calls 23840->23843 23842 6c34aa0e 3 API calls 23841->23842 23842->23844 23843->23844 23847 6c348e04 23844->23847 24798 6c332c20 39 API calls 3 library calls 23844->24798 23846 6c348eac _Yarn 23850 6c348f4d std::ios_base::_Ios_base_dtor 23846->23850 24800 6c332c20 39 API calls 3 library calls 23846->24800 23847->23846 24799 6c332c20 39 API calls 3 library calls 23847->24799 23850->23833 23851 6c349091 GetFileAttributesA 23850->23851 23851->23833 23852 6c3490a1 CoInitialize CoCreateInstance 23851->23852 23853 6c34915d CoUninitialize 23852->23853 23854 6c3490c9 MultiByteToWideChar 23852->23854 23853->23833 23857 6c349103 23854->23857 23856 6c34914b 23856->23853 23857->23856 23858 6c349126 MultiByteToWideChar 23857->23858 23858->23856 23859->23686 23860->23720 23861->23707 23862->23710 23863->23713 23864->23716 23865->23719 23866->23722 23867->23725 24804 6c353c9d 29 API calls __wsopen_s 23869->24804 23871 6c353a6d 24805 6c353a7b 11 API calls std::locale::_Setgloballocale 23871->24805 23873 6c353a7a 23875 6c353f2a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23874->23875 23875->23731 23946 6c35a893 GetLastError 23876->23946 23879 6c355159 23880 6c35a893 __Getctype 39 API calls 23879->23880 23881 6c331a9c 23880->23881 23881->23736 23883 6c331de5 23882->23883 23884 6c331ccb 23882->23884 23993 6c331df0 30 API calls 2 library calls 23883->23993 23886 6c331ce2 23884->23886 23887 6c331d24 23884->23887 23893 6c331cfe _Yarn 23884->23893 23886->23883 23888 6c331cee 23886->23888 23889 6c34aa0e 3 API calls 23887->23889 23982 6c34aa0e 23888->23982 23889->23893 23890 6c353a5e 29 API calls 23892 6c331def 23890->23892 23893->23890 23894 6c331db3 std::ios_base::_Ios_base_dtor 23893->23894 23894->23750 23896 6c331039 23895->23896 23897 6c33100d 23895->23897 23997 6c3311b0 23896->23997 23897->23896 23899 6c3311b0 39 API calls 23897->23899 23899->23897 23900 6c331136 23901 6c331169 23900->23901 23903 6c3311b0 39 API calls 23900->23903 23902 6c3311b0 39 API calls 23901->23902 23904 6c331178 23902->23904 23903->23900 23905 6c3311b0 39 API calls 23904->23905 23908 6c33118a 23905->23908 23906 6c331048 23906->23900 23907 6c3311b0 39 API calls 23906->23907 23907->23906 24007 6c3315d0 23908->24007 23911 6c3311b0 39 API calls 23912 6c3311a2 23911->23912 23912->23750 23914 6c3533df ___scrt_is_nonwritable_in_current_image 23913->23914 24030 6c353d46 EnterCriticalSection 23914->24030 23916 6c3533e6 24031 6c353691 23916->24031 23922 6c3318e7 23921->23922 23923 6c33193c 23922->23923 23928 6c331b16 23922->23928 23926 6c355159 39 API calls 23923->23926 23930 6c3319a2 23923->23930 23924 6c3318c0 95 API calls 23925 6c331b67 Sleep 23924->23925 23925->23928 23929 6c331b78 23925->23929 23927 6c331978 23926->23927 23931 6c355159 39 API calls 23927->23931 23928->23924 23933 6c331000 75 API calls 23928->23933 23936 6c3533d3 28 API calls 23928->23936 24064 6c353423 29 API calls 2 library calls 23928->24064 23937 6c331bb4 std::ios_base::_Ios_base_dtor 23929->23937 23939 6c353a5e 29 API calls 23929->23939 23932 6c34aa82 _ValidateLocalCookies 5 API calls 23930->23932 23935 6c331984 23931->23935 23934 6c331a1f 23932->23934 23933->23928 23934->23748 23935->23930 23938 6c331c70 30 API calls 23935->23938 23936->23928 23937->23748 23938->23930 23940 6c331bdb 23939->23940 24065 6c331c00 29 API calls std::ios_base::_Ios_base_dtor 23940->24065 23943 6c331bef 23943->23748 23944->23750 23945->23749 23947 6c35a8a9 23946->23947 23951 6c35a8af 23946->23951 23973 6c35c942 6 API calls std::_Lockit::_Lockit 23947->23973 23950 6c35a8cb 23952 6c35cf6f __Getctype 14 API calls 23950->23952 23971 6c35a8b3 SetLastError 23950->23971 23951->23971 23974 6c35c981 6 API calls std::_Lockit::_Lockit 23951->23974 23954 6c35a8e0 23952->23954 23957 6c35a8f9 23954->23957 23958 6c35a8e8 23954->23958 23955 6c331a6d 23955->23879 23956 6c35a948 23981 6c353fb8 39 API calls std::locale::_Setgloballocale 23956->23981 23976 6c35c981 6 API calls std::_Lockit::_Lockit 23957->23976 23975 6c35c981 6 API calls std::_Lockit::_Lockit 23958->23975 23963 6c35a8f6 23978 6c35a607 14 API calls __dosmaperr 23963->23978 23964 6c35a905 23965 6c35a920 23964->23965 23966 6c35a909 23964->23966 23979 6c35abd0 14 API calls __Getctype 23965->23979 23977 6c35c981 6 API calls std::_Lockit::_Lockit 23966->23977 23970 6c35a92b 23980 6c35a607 14 API calls __dosmaperr 23970->23980 23971->23955 23971->23956 23973->23951 23974->23950 23975->23963 23976->23964 23977->23963 23978->23971 23979->23970 23980->23971 23983 6c34aa13 ___std_exception_copy 23982->23983 23984 6c34aa2d 23983->23984 23986 6c34aa2f 23983->23986 23994 6c3524cf EnterCriticalSection LeaveCriticalSection __Getctype 23983->23994 23984->23893 23987 6c34c2f8 23986->23987 23989 6c34aa39 Concurrency::cancel_current_task 23986->23989 23996 6c34d2b3 RaiseException 23987->23996 23995 6c34d2b3 RaiseException 23989->23995 23990 6c34c314 23992 6c34b51c 23993->23893 23994->23983 23995->23992 23996->23990 23998 6c3311e8 _strlen 23997->23998 24005 6c331259 23998->24005 24019 6c332060 39 API calls CallUnexpected 23998->24019 24001 6c3314a6 24001->23906 24002 6c331493 24002->24001 24020 6c332d90 39 API calls CallUnexpected 24002->24020 24005->24002 24021 6c332300 38 API calls 24005->24021 24022 6c3326d0 30 API calls 3 library calls 24005->24022 24023 6c34d2b3 RaiseException 24005->24023 24008 6c33160f 24007->24008 24012 6c33164d 24008->24012 24018 6c331623 24008->24018 24024 6c332060 39 API calls CallUnexpected 24008->24024 24011 6c33175d 24014 6c331197 24011->24014 24026 6c332d90 39 API calls CallUnexpected 24011->24026 24012->24018 24025 6c332eb0 67 API calls 2 library calls 24012->24025 24014->23911 24018->24011 24027 6c332300 38 API calls 24018->24027 24028 6c3326d0 30 API calls 3 library calls 24018->24028 24029 6c34d2b3 RaiseException 24018->24029 24019->24005 24020->24001 24021->24005 24022->24005 24023->24005 24024->24012 24025->24018 24026->24014 24027->24018 24028->24018 24029->24018 24030->23916 24032 6c3536af 24031->24032 24033 6c3536be 24032->24033 24057 6c360a69 CreateFileW ___initconin 24032->24057 24050 6c34aa82 24033->24050 24035 6c3536cb 24035->24033 24058 6c360ada 5 API calls ___initconin 24035->24058 24038 6c3533f4 24047 6c35341a 24038->24047 24039 6c3536dc 24039->24033 24040 6c35371c 24039->24040 24044 6c353709 __alloca_probe_16 24039->24044 24046 6c353746 24039->24046 24059 6c35a641 15 API calls 2 library calls 24040->24059 24043 6c353722 24043->24044 24044->24046 24060 6c360b20 5 API calls ___initconin 24044->24060 24061 6c34cb0b 14 API calls __freea 24046->24061 24063 6c353d5d LeaveCriticalSection 24047->24063 24049 6c353405 24049->23750 24051 6c34aa8a 24050->24051 24052 6c34aa8b IsProcessorFeaturePresent 24050->24052 24051->24038 24054 6c34c407 24052->24054 24062 6c34c4ed SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24054->24062 24056 6c34c4ea 24056->24038 24057->24035 24058->24039 24059->24043 24060->24046 24061->24033 24062->24056 24063->24049 24064->23928 24065->23943 24066->23756 24067->23769 24068->23766 24070 6c33c5b5 24069->24070 24133 6c33bd70 24070->24133 24072 6c33c656 24073 6c34aa0e 3 API calls 24072->24073 24074 6c33c68e 24073->24074 24150 6c34b2cf 24074->24150 24076 6c33c6a2 24162 6c33bb60 24076->24162 24079 6c33c785 24079->23777 24081 6c33c7bf 24171 6c3326d0 30 API calls 3 library calls 24081->24171 24083 6c33c7d1 24172 6c34d2b3 RaiseException 24083->24172 24085 6c33c7e6 24173 6c33a100 72 API calls 24085->24173 24087 6c33c7ff 24087->23777 24089 6c3478bf 24088->24089 24503 6c33cd30 24089->24503 24092 6c34761b 24094 6c347a10 24092->24094 24095 6c347b55 24094->24095 24096 6c347a79 24094->24096 24622 6c332300 38 API calls 24095->24622 24099 6c33cd30 75 API calls 24096->24099 24098 6c347b7e 24623 6c332370 30 API calls 24098->24623 24101 6c347aa1 24099->24101 24103 6c347ab5 24101->24103 24112 6c33ac40 70 API calls 24101->24112 24102 6c347b90 24624 6c34d2b3 RaiseException 24102->24624 24108 6c347651 24103->24108 24625 6c332300 38 API calls 24103->24625 24106 6c347bca 24626 6c3326d0 30 API calls 3 library calls 24106->24626 24108->23784 24108->23785 24109 6c347be5 24627 6c34d2b3 RaiseException 24109->24627 24111 6c347bfa 24112->24103 24113->23798 24115 6c339b89 24114->24115 24125 6c339bb9 24114->24125 24117 6c33b030 69 API calls 24115->24117 24116 6c339c7a 24119 6c34aa82 _ValidateLocalCookies 5 API calls 24116->24119 24120 6c339baf 24117->24120 24118 6c339c8c 24628 6c332300 38 API calls 24118->24628 24121 6c339c85 24119->24121 24123 6c354007 69 API calls 24120->24123 24121->23802 24123->24125 24124 6c339cbc 24629 6c332370 30 API calls 24124->24629 24125->24116 24125->24118 24127 6c339ccc 24630 6c34d2b3 RaiseException 24127->24630 24129 6c339cd7 24130->23782 24131->23787 24132->23796 24134 6c34aa0e 3 API calls 24133->24134 24135 6c33bdce 24134->24135 24136 6c34b2cf 44 API calls 24135->24136 24137 6c33bde2 24136->24137 24174 6c334ca0 67 API calls 3 library calls 24137->24174 24139 6c33be18 24140 6c33be8d 24139->24140 24142 6c33be64 24139->24142 24176 6c332300 38 API calls 24140->24176 24141 6c33be77 24141->24072 24142->24141 24175 6c34af37 9 API calls 2 library calls 24142->24175 24145 6c33beb7 24177 6c332370 30 API calls 24145->24177 24147 6c33becd 24178 6c34d2b3 RaiseException 24147->24178 24149 6c33bed8 24149->24072 24151 6c34b2db __EH_prolog3 24150->24151 24179 6c34ae5e 24151->24179 24156 6c34b2f9 24193 6c34b362 41 API calls std::locale::_Setgloballocale 24156->24193 24157 6c34b317 24185 6c34ae8f 24157->24185 24158 6c34b354 __DllMainCRTStartup@12 24158->24076 24160 6c34b301 24194 6c34b159 14 API calls 3 library calls 24160->24194 24163 6c33bbac 24162->24163 24169 6c33bb97 24162->24169 24199 6c34b3ef 24163->24199 24167 6c33bc52 24208 6c33b4e0 67 API calls 2 library calls 24167->24208 24169->24079 24170 6c332300 38 API calls 24169->24170 24170->24081 24171->24083 24172->24085 24173->24087 24174->24139 24175->24141 24176->24145 24177->24147 24178->24149 24180 6c34ae6d 24179->24180 24182 6c34ae74 24179->24182 24195 6c353d74 6 API calls std::_Lockit::_Lockit 24180->24195 24183 6c34ae72 24182->24183 24196 6c34c9db EnterCriticalSection 24182->24196 24183->24157 24192 6c34b1d8 15 API calls std::locale::_Locimp::_Locimp 24183->24192 24186 6c353d82 24185->24186 24187 6c34ae99 24185->24187 24198 6c353d5d LeaveCriticalSection 24186->24198 24188 6c34aeac 24187->24188 24197 6c34c9e9 LeaveCriticalSection 24187->24197 24188->24158 24190 6c353d89 24190->24158 24192->24156 24193->24160 24194->24157 24195->24183 24196->24183 24197->24188 24198->24190 24200 6c34b3f8 24199->24200 24201 6c33bbba 24200->24201 24209 6c353311 24200->24209 24201->24169 24207 6c350063 29 API calls 2 library calls 24201->24207 24205 6c34b467 24205->24201 24232 6c354007 24205->24232 24207->24167 24208->24169 24210 6c35331c ___scrt_is_nonwritable_in_current_image 24209->24210 24211 6c35332f 24210->24211 24214 6c35334f 24210->24214 24250 6c352f04 14 API calls __dosmaperr 24211->24250 24213 6c353334 24251 6c353a4e 29 API calls __wsopen_s 24213->24251 24216 6c353354 24214->24216 24217 6c353361 24214->24217 24252 6c352f04 14 API calls __dosmaperr 24216->24252 24236 6c360537 24217->24236 24218 6c34b44c 24218->24201 24228 6c352fb4 24218->24228 24222 6c353371 24253 6c352f04 14 API calls __dosmaperr 24222->24253 24223 6c35337e 24244 6c36069d 24223->24244 24229 6c352fc7 __wsopen_s 24228->24229 24384 6c353267 24229->24384 24231 6c352fdc __wsopen_s 24231->24205 24233 6c35401a __wsopen_s 24232->24233 24437 6c3540c5 24233->24437 24235 6c354026 __wsopen_s 24235->24201 24237 6c360543 ___scrt_is_nonwritable_in_current_image 24236->24237 24255 6c353d46 EnterCriticalSection 24237->24255 24239 6c360551 24256 6c3605db 24239->24256 24245 6c3607bc 24244->24245 24278 6c36083f 24245->24278 24248 6c353393 24254 6c3533bc LeaveCriticalSection __fread_nolock 24248->24254 24250->24213 24251->24218 24252->24218 24253->24218 24254->24218 24255->24239 24257 6c3605fe 24256->24257 24258 6c360656 24257->24258 24265 6c36055e 24257->24265 24272 6c3500a9 EnterCriticalSection 24257->24272 24273 6c3500bd LeaveCriticalSection 24257->24273 24259 6c35cf6f __Getctype 14 API calls 24258->24259 24260 6c36065f 24259->24260 24274 6c35a607 14 API calls __dosmaperr 24260->24274 24263 6c360668 24263->24265 24275 6c35ca3e 6 API calls std::_Lockit::_Lockit 24263->24275 24269 6c360597 24265->24269 24267 6c360687 24276 6c3500a9 EnterCriticalSection 24267->24276 24277 6c353d5d LeaveCriticalSection 24269->24277 24271 6c35336a 24271->24222 24271->24223 24272->24257 24273->24257 24274->24263 24275->24267 24276->24265 24277->24271 24280 6c36085e 24278->24280 24279 6c360886 24293 6c3609a6 24279->24293 24300 6c369a21 39 API calls 2 library calls 24279->24300 24280->24279 24281 6c360871 24280->24281 24298 6c352f04 14 API calls __dosmaperr 24281->24298 24283 6c360876 24299 6c353a4e 29 API calls __wsopen_s 24283->24299 24285 6c3607d2 24285->24248 24295 6c369b59 24285->24295 24287 6c360a57 24304 6c353a4e 29 API calls __wsopen_s 24287->24304 24290 6c3609f6 24290->24293 24301 6c369a21 39 API calls 2 library calls 24290->24301 24292 6c360a14 24292->24293 24302 6c369a21 39 API calls 2 library calls 24292->24302 24293->24285 24303 6c352f04 14 API calls __dosmaperr 24293->24303 24305 6c369f11 24295->24305 24298->24283 24299->24285 24300->24290 24301->24292 24302->24293 24303->24287 24304->24285 24307 6c369f1d ___scrt_is_nonwritable_in_current_image 24305->24307 24306 6c369f24 24325 6c352f04 14 API calls __dosmaperr 24306->24325 24307->24306 24309 6c369f4f 24307->24309 24316 6c369b79 24309->24316 24310 6c369f29 24326 6c353a4e 29 API calls __wsopen_s 24310->24326 24315 6c369b74 24315->24248 24328 6c3551ef 24316->24328 24321 6c369baf 24323 6c369be1 24321->24323 24383 6c35a607 14 API calls __dosmaperr 24321->24383 24327 6c369fa6 LeaveCriticalSection __wsopen_s 24323->24327 24325->24310 24326->24315 24327->24315 24329 6c34f6fa __wsopen_s 39 API calls 24328->24329 24330 6c355201 24329->24330 24331 6c355213 24330->24331 24332 6c35c851 __wsopen_s 5 API calls 24330->24332 24333 6c34f7f4 24331->24333 24332->24331 24334 6c34f869 __wsopen_s 17 API calls 24333->24334 24335 6c34f80c 24334->24335 24335->24321 24336 6c369be7 24335->24336 24337 6c36a081 __wsopen_s 29 API calls 24336->24337 24338 6c369c04 24337->24338 24339 6c369c32 24338->24339 24340 6c369c19 24338->24340 24342 6c366ded __wsopen_s 18 API calls 24339->24342 24341 6c352f17 __dosmaperr 14 API calls 24340->24341 24343 6c369c1e 24341->24343 24344 6c369c37 24342->24344 24348 6c352f04 __dosmaperr 14 API calls 24343->24348 24345 6c369c57 24344->24345 24346 6c369c40 24344->24346 24347 6c369fec __wsopen_s CreateFileW 24345->24347 24349 6c352f17 __dosmaperr 14 API calls 24346->24349 24356 6c369c90 24347->24356 24375 6c369c2b 24348->24375 24350 6c369c45 24349->24350 24352 6c352f04 __dosmaperr 14 API calls 24350->24352 24351 6c369d0d GetFileType 24354 6c369d5f 24351->24354 24355 6c369d18 GetLastError 24351->24355 24352->24343 24353 6c369ce2 GetLastError 24357 6c352f2a __dosmaperr 14 API calls 24353->24357 24361 6c366f91 __wsopen_s 15 API calls 24354->24361 24358 6c352f2a __dosmaperr 14 API calls 24355->24358 24356->24351 24356->24353 24359 6c369fec __wsopen_s CreateFileW 24356->24359 24357->24343 24360 6c369d26 CloseHandle 24358->24360 24362 6c369cd5 24359->24362 24360->24343 24363 6c369d4f 24360->24363 24365 6c369d80 24361->24365 24362->24351 24362->24353 24364 6c352f04 __dosmaperr 14 API calls 24363->24364 24366 6c369d54 24364->24366 24367 6c369dcc 24365->24367 24369 6c36a1fb __wsopen_s 73 API calls 24365->24369 24366->24343 24368 6c36a2a5 __wsopen_s 73 API calls 24367->24368 24372 6c369dd3 24367->24372 24370 6c369e01 24368->24370 24369->24367 24371 6c369e0f 24370->24371 24370->24372 24374 6c369e8b CloseHandle 24371->24374 24371->24375 24373 6c360ec2 __wsopen_s 32 API calls 24372->24373 24373->24375 24376 6c369fec __wsopen_s CreateFileW 24374->24376 24375->24321 24377 6c369eb6 24376->24377 24378 6c369eec 24377->24378 24379 6c369ec0 GetLastError 24377->24379 24378->24375 24380 6c352f2a __dosmaperr 14 API calls 24379->24380 24381 6c369ecc 24380->24381 24382 6c366f00 __wsopen_s 15 API calls 24381->24382 24382->24378 24383->24323 24386 6c353273 ___scrt_is_nonwritable_in_current_image 24384->24386 24385 6c353279 24407 6c353bf7 29 API calls 2 library calls 24385->24407 24386->24385 24389 6c3532bc 24386->24389 24388 6c353294 24388->24231 24395 6c3500a9 EnterCriticalSection 24389->24395 24391 6c3532c8 24396 6c35317b 24391->24396 24393 6c3532de 24408 6c353307 LeaveCriticalSection __fread_nolock 24393->24408 24395->24391 24397 6c3531a1 24396->24397 24398 6c35318e 24396->24398 24409 6c3530a2 24397->24409 24398->24393 24400 6c3531c4 24401 6c3531df 24400->24401 24406 6c353252 24400->24406 24416 6c35ff35 34 API calls 3 library calls 24400->24416 24402 6c35421d ___scrt_uninitialize_crt 64 API calls 24401->24402 24404 6c3531f2 24402->24404 24413 6c35fd1b 24404->24413 24406->24393 24407->24388 24408->24388 24410 6c3530b3 24409->24410 24412 6c35310b 24409->24412 24410->24412 24417 6c35fcdb 31 API calls 2 library calls 24410->24417 24412->24400 24418 6c35fe7c 24413->24418 24415 6c35fd34 24415->24406 24416->24401 24417->24412 24424 6c366d83 24418->24424 24420 6c35fe8e 24421 6c35feaa SetFilePointerEx 24420->24421 24423 6c35fe96 __wsopen_s 24420->24423 24422 6c35fec2 GetLastError 24421->24422 24421->24423 24422->24423 24423->24415 24425 6c366d90 24424->24425 24428 6c366da5 24424->24428 24426 6c352f17 __dosmaperr 14 API calls 24425->24426 24427 6c366d95 24426->24427 24430 6c352f04 __dosmaperr 14 API calls 24427->24430 24429 6c352f17 __dosmaperr 14 API calls 24428->24429 24431 6c366dca 24428->24431 24432 6c366dd5 24429->24432 24433 6c366d9d 24430->24433 24431->24420 24434 6c352f04 __dosmaperr 14 API calls 24432->24434 24433->24420 24435 6c366ddd 24434->24435 24436 6c353a4e __wsopen_s 29 API calls 24435->24436 24436->24433 24438 6c3540d1 ___scrt_is_nonwritable_in_current_image 24437->24438 24439 6c3540db 24438->24439 24441 6c3540fe 24438->24441 24463 6c353bf7 29 API calls 2 library calls 24439->24463 24447 6c3540f6 24441->24447 24448 6c3500a9 EnterCriticalSection 24441->24448 24443 6c35411c 24449 6c354037 24443->24449 24445 6c354129 24464 6c354154 LeaveCriticalSection __fread_nolock 24445->24464 24447->24235 24448->24443 24450 6c354044 24449->24450 24451 6c354067 24449->24451 24476 6c353bf7 29 API calls 2 library calls 24450->24476 24453 6c35405f 24451->24453 24454 6c35421d ___scrt_uninitialize_crt 64 API calls 24451->24454 24453->24445 24455 6c35407f 24454->24455 24465 6c35e56c 24455->24465 24458 6c35f3a2 __fread_nolock 29 API calls 24459 6c354093 24458->24459 24469 6c360f92 24459->24469 24463->24447 24464->24447 24466 6c35e583 24465->24466 24467 6c354087 24465->24467 24466->24467 24478 6c35a607 14 API calls __dosmaperr 24466->24478 24467->24458 24470 6c360fbb 24469->24470 24473 6c35409a 24469->24473 24471 6c36100a 24470->24471 24474 6c360fe2 24470->24474 24487 6c353bf7 29 API calls 2 library calls 24471->24487 24473->24453 24477 6c35a607 14 API calls __dosmaperr 24473->24477 24479 6c361035 24474->24479 24476->24453 24477->24453 24478->24467 24480 6c361041 ___scrt_is_nonwritable_in_current_image 24479->24480 24488 6c367171 EnterCriticalSection 24480->24488 24482 6c36104f 24483 6c361080 24482->24483 24489 6c360ef2 24482->24489 24502 6c3610ba LeaveCriticalSection __wsopen_s 24483->24502 24486 6c3610a3 24486->24473 24487->24473 24488->24482 24490 6c366d83 __wsopen_s 29 API calls 24489->24490 24493 6c360f02 24490->24493 24491 6c360f08 24492 6c366f00 __wsopen_s 15 API calls 24491->24492 24496 6c360f60 __wsopen_s 24492->24496 24493->24491 24494 6c366d83 __wsopen_s 29 API calls 24493->24494 24501 6c360f3a 24493->24501 24497 6c360f31 24494->24497 24495 6c366d83 __wsopen_s 29 API calls 24498 6c360f46 CloseHandle 24495->24498 24496->24483 24499 6c366d83 __wsopen_s 29 API calls 24497->24499 24498->24491 24500 6c360f52 GetLastError 24498->24500 24499->24501 24500->24491 24501->24491 24501->24495 24502->24486 24504 6c33cda1 24503->24504 24505 6c33cd6c 24503->24505 24511 6c33cdb2 24504->24511 24534 6c332060 39 API calls CallUnexpected 24504->24534 24506 6c33cd9a 24505->24506 24536 6c332300 38 API calls 24505->24536 24506->24092 24521 6c33ac40 24506->24521 24509 6c33cf7f 24537 6c332370 30 API calls 24509->24537 24511->24506 24535 6c334ca0 67 API calls 3 library calls 24511->24535 24512 6c33cf8e 24538 6c34d2b3 RaiseException 24512->24538 24516 6c33cfcb 24540 6c332370 30 API calls 24516->24540 24518 6c33cfe1 24541 6c34d2b3 RaiseException 24518->24541 24520 6c33cdec 24520->24506 24539 6c332300 38 API calls 24520->24539 24522 6c33ac92 24521->24522 24523 6c33acdc 24521->24523 24542 6c33b030 24522->24542 24524 6c34aa82 _ValidateLocalCookies 5 API calls 24523->24524 24526 6c33acfe 24524->24526 24526->24092 24528 6c33acb9 24528->24523 24552 6c354614 24528->24552 24531 6c33acd1 24531->24523 24532 6c33ad0a 24531->24532 24533 6c34aa82 _ValidateLocalCookies 5 API calls 24532->24533 24533->24526 24534->24511 24535->24520 24536->24509 24537->24512 24538->24520 24539->24516 24540->24518 24541->24506 24545 6c33b09e 24542->24545 24546 6c33b04a 24542->24546 24543 6c34aa82 _ValidateLocalCookies 5 API calls 24544 6c33ac9d 24543->24544 24544->24523 24544->24528 24548 6c352fee 24544->24548 24545->24543 24546->24545 24547 6c354c68 69 API calls 24546->24547 24547->24545 24549 6c353001 __wsopen_s 24548->24549 24550 6c353267 67 API calls 24549->24550 24551 6c353016 __wsopen_s 24550->24551 24551->24528 24553 6c354634 24552->24553 24554 6c35461f 24552->24554 24556 6c354651 24553->24556 24557 6c35463c 24553->24557 24570 6c352f04 14 API calls __dosmaperr 24554->24570 24566 6c35feff 24556->24566 24572 6c352f04 14 API calls __dosmaperr 24557->24572 24558 6c354624 24571 6c353a4e 29 API calls __wsopen_s 24558->24571 24561 6c35464c 24561->24531 24563 6c354641 24573 6c353a4e 29 API calls __wsopen_s 24563->24573 24564 6c35462f 24564->24531 24567 6c35ff13 __wsopen_s 24566->24567 24574 6c3604a8 24567->24574 24569 6c35ff1f __wsopen_s 24569->24561 24570->24558 24571->24564 24572->24563 24573->24561 24575 6c3604b4 ___scrt_is_nonwritable_in_current_image 24574->24575 24576 6c3604de 24575->24576 24577 6c3604bb 24575->24577 24585 6c3500a9 EnterCriticalSection 24576->24585 24600 6c353bf7 29 API calls 2 library calls 24577->24600 24580 6c3604ec 24586 6c360307 24580->24586 24582 6c3604fb 24601 6c36052d LeaveCriticalSection __fread_nolock 24582->24601 24584 6c3604d4 24584->24569 24585->24580 24587 6c360316 24586->24587 24588 6c36033e 24586->24588 24605 6c353bf7 29 API calls 2 library calls 24587->24605 24590 6c35f3a2 __fread_nolock 29 API calls 24588->24590 24591 6c360347 24590->24591 24602 6c35fd39 24591->24602 24594 6c3603f1 24606 6c35ff91 34 API calls 4 library calls 24594->24606 24596 6c360408 24599 6c360331 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24596->24599 24607 6c36013c 33 API calls 2 library calls 24596->24607 24597 6c360400 24597->24599 24599->24582 24600->24584 24601->24584 24608 6c35fd57 24602->24608 24605->24599 24606->24597 24607->24599 24610 6c35fd63 ___scrt_is_nonwritable_in_current_image 24608->24610 24609 6c35fda6 24620 6c353bf7 29 API calls 2 library calls 24609->24620 24610->24609 24612 6c35fdec 24610->24612 24618 6c35fd52 24610->24618 24619 6c367171 EnterCriticalSection 24612->24619 24614 6c35fdf2 24615 6c35fe13 24614->24615 24616 6c35fe7c __fread_nolock 31 API calls 24614->24616 24621 6c35fe74 LeaveCriticalSection __wsopen_s 24615->24621 24616->24615 24618->24594 24618->24596 24618->24599 24619->24614 24620->24618 24621->24618 24622->24098 24623->24102 24624->24103 24625->24106 24626->24109 24627->24111 24628->24124 24629->24127 24630->24129 24681 6c336520 24631->24681 24633 6c336eee _Yarn 24634 6c336faf CryptAcquireContextW 24633->24634 24635 6c3373c2 24634->24635 24636 6c336fdc CryptImportKey 24634->24636 24705 6c34d87e 29 API calls 2 library calls 24635->24705 24638 6c337032 CryptSetKeyParam 24636->24638 24639 6c33742a CryptReleaseContext 24636->24639 24642 6c337494 CryptDestroyKey CryptReleaseContext 24638->24642 24643 6c33704a CryptSetKeyParam 24638->24643 24707 6c34d87e 29 API calls 2 library calls 24639->24707 24641 6c337404 24706 6c34d2b3 RaiseException 24641->24706 24709 6c34d87e 29 API calls 2 library calls 24642->24709 24647 6c337507 CryptDestroyKey CryptReleaseContext 24643->24647 24653 6c337070 24643->24653 24644 6c33746e 24708 6c34d2b3 RaiseException 24644->24708 24711 6c34d87e 29 API calls 2 library calls 24647->24711 24649 6c3374e1 24710 6c34d2b3 RaiseException 24649->24710 24651 6c337422 24715 6c3326c0 30 API calls 3 library calls 24651->24715 24652 6c3375d8 24716 6c337640 54 API calls 4 library calls 24652->24716 24653->24652 24657 6c3370b3 24653->24657 24658 6c3370d7 24653->24658 24672 6c3370bc _Yarn 24653->24672 24654 6c337115 CryptDecrypt CryptDestroyKey CryptReleaseContext 24661 6c337574 24654->24661 24671 6c337147 __fread_nolock 24654->24671 24656 6c337551 24712 6c34d2b3 RaiseException 24656->24712 24664 6c34aa0e 3 API calls 24657->24664 24665 6c34aa0e 3 API calls 24658->24665 24713 6c34d87e 29 API calls 2 library calls 24661->24713 24664->24672 24665->24672 24666 6c3375dd 24717 6c336720 24666->24717 24667 6c3375aa 24714 6c34d2b3 RaiseException 24667->24714 24670 6c3375ef 24670->23805 24671->24651 24673 6c337212 24671->24673 24674 6c33722b 24671->24674 24678 6c3371cf std::ios_base::_Ios_base_dtor _Yarn 24671->24678 24672->24654 24676 6c34aa0e 3 API calls 24673->24676 24675 6c34aa0e 3 API calls 24674->24675 24675->24678 24676->24678 24677 6c353a5e 29 API calls 24677->24635 24678->24677 24679 6c337398 std::ios_base::_Ios_base_dtor 24678->24679 24679->23805 24680->23810 24682 6c336561 CryptStringToBinaryA 24681->24682 24683 6c33655f 24681->24683 24684 6c33662b 24682->24684 24685 6c33657e 24682->24685 24683->24682 24762 6c3366c0 29 API calls 2 library calls 24684->24762 24689 6c3365aa 24685->24689 24690 6c3365cd 24685->24690 24703 6c336691 24685->24703 24704 6c3365b3 __fread_nolock 24685->24704 24687 6c33663a 24763 6c34d2b3 RaiseException 24687->24763 24688 6c336600 CryptStringToBinaryA 24693 6c336645 24688->24693 24694 6c336618 24688->24694 24695 6c34aa0e 3 API calls 24689->24695 24696 6c34aa0e 3 API calls 24690->24696 24764 6c34d87e 29 API calls 2 library calls 24693->24764 24694->24633 24695->24704 24696->24704 24697 6c336699 24699 6c336720 46 API calls 24697->24699 24701 6c3366af 24699->24701 24700 6c336672 24765 6c34d2b3 RaiseException 24700->24765 24701->24633 24766 6c337640 54 API calls 4 library calls 24703->24766 24704->24688 24705->24641 24706->24651 24707->24644 24708->24651 24709->24649 24710->24651 24711->24656 24712->24651 24713->24667 24714->24651 24715->24652 24716->24666 24718 6c33672a 24717->24718 24719 6c33674a std::ios_base::_Ios_base_dtor 24717->24719 24718->24719 24720 6c353a5e 29 API calls 24718->24720 24719->24670 24721 6c336775 CryptAcquireContextW 24720->24721 24723 6c336e09 24721->24723 24744 6c336814 __fread_nolock 24721->24744 24777 6c34d87e 29 API calls 2 library calls 24723->24777 24725 6c3369e8 CryptReleaseContext 24759 6c336a0a std::ios_base::_Ios_base_dtor _Yarn 24725->24759 24726 6c33685e CryptCreateHash 24728 6c336d1c CryptReleaseContext 24726->24728 24726->24744 24727 6c336e42 24778 6c34d2b3 RaiseException 24727->24778 24773 6c34d87e 29 API calls 2 library calls 24728->24773 24730 6c336884 CryptHashData 24733 6c336d8d CryptDestroyHash CryptReleaseContext 24730->24733 24730->24744 24731 6c336c52 24735 6c336720 30 API calls 24731->24735 24775 6c34d87e 29 API calls 2 library calls 24733->24775 24734 6c336d60 24774 6c34d2b3 RaiseException 24734->24774 24738 6c336e7f 24735->24738 24741 6c336720 30 API calls 24738->24741 24739 6c336dda 24776 6c34d2b3 RaiseException 24739->24776 24743 6c336e87 24741->24743 24742 6c3368e7 CryptHashData 24745 6c336904 CryptGetHashParam 24742->24745 24746 6c336c5a CryptDestroyHash CryptReleaseContext 24742->24746 24743->24670 24744->24725 24744->24726 24744->24730 24744->24742 24752 6c336980 CryptGetHashParam CryptDestroyHash 24744->24752 24745->24744 24747 6c336cbb CryptDestroyHash CryptReleaseContext 24745->24747 24769 6c34d87e 29 API calls 2 library calls 24746->24769 24771 6c34d87e 29 API calls 2 library calls 24747->24771 24749 6c336c9b 24770 6c34d2b3 RaiseException 24749->24770 24752->24744 24755 6c336c02 CryptReleaseContext 24752->24755 24753 6c336cfc 24772 6c34d2b3 RaiseException 24753->24772 24767 6c34d87e 29 API calls 2 library calls 24755->24767 24757 6c336bdf std::ios_base::_Ios_base_dtor 24757->24670 24758 6c353a5e 29 API calls 24758->24723 24759->24757 24759->24758 24760 6c336c3a 24768 6c34d2b3 RaiseException 24760->24768 24762->24687 24763->24693 24764->24700 24765->24703 24766->24697 24767->24760 24768->24731 24769->24749 24770->24731 24771->24753 24772->24731 24773->24734 24774->24731 24775->24739 24776->24731 24777->24727 24778->24731 24780 6c3635a2 24779->24780 24781 6c363590 GetLastError 24779->24781 24780->23820 24785 6c352f2a 14 API calls __dosmaperr 24781->24785 24783 6c36359c 24783->23820 24784->23822 24785->24783 24787 6c34614e 24786->24787 24788 6c3462cc 24787->24788 24789 6c3461ba 24787->24789 24796 6c346152 _Yarn 24787->24796 24803 6c3326c0 30 API calls 3 library calls 24788->24803 24791 6c346252 24789->24791 24793 6c3461da 24789->24793 24794 6c34aa0e 3 API calls 24791->24794 24792 6c3462d1 24792->23826 24795 6c34aa0e 3 API calls 24793->24795 24794->24796 24795->24796 24796->23826 24797->23829 24798->23847 24799->23846 24800->23850 24801->23835 24802->23838 24803->24792 24804->23871 24805->23873 24807 131215 24814 131721 GetModuleHandleW 24807->24814 24809 13121d 24810 131253 _exit 24809->24810 24811 131221 24809->24811 24812 131227 _c_exit 24811->24812 24813 13122c 24811->24813 24812->24813 24814->24809 24815 6c360bfe CreateFileW 24816 6c34d159 24817 6c34d167 24816->24817 24818 6c34d162 24816->24818 24822 6c34d04e 24817->24822 24833 6c34d17c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24818->24833 24823 6c34d05a ___scrt_is_nonwritable_in_current_image 24822->24823 24824 6c34d083 dllmain_raw 24823->24824 24828 6c34d07e __DllMainCRTStartup@12 24823->24828 24830 6c34d069 24823->24830 24825 6c34d09d dllmain_crt_dispatch 24824->24825 24824->24830 24825->24828 24825->24830 24826 6c34d0ef 24827 6c34d0f8 dllmain_crt_dispatch 24826->24827 24826->24830 24829 6c34d10b dllmain_raw 24827->24829 24827->24830 24828->24826 24834 6c34cf22 114 API calls 4 library calls 24828->24834 24829->24830 24832 6c34d0e4 dllmain_raw 24832->24826 24833->24817 24834->24832 24835 6c3488b9 Sleep 24843 6c3487d0 std::ios_base::_Ios_base_dtor _Yarn _strlen 24835->24843 24836 6c3488f2 _strlen 24840 6c348925 24836->24840 24867 6c3326c0 30 API calls 3 library calls 24836->24867 24838 6c34aa0e RaiseException EnterCriticalSection LeaveCriticalSection 24838->24843 24841 6c348980 24840->24841 24842 6c348962 24840->24842 24846 6c34892c _Yarn 24840->24846 24845 6c34aa0e 3 API calls 24841->24845 24844 6c34aa0e 3 API calls 24842->24844 24843->24835 24843->24836 24843->24838 24850 6c3489c9 24843->24850 24852 6c3480f0 CreateToolhelp32Snapshot 24843->24852 24844->24846 24845->24846 24868 6c348330 41 API calls 3 library calls 24846->24868 24847 6c353a5e 29 API calls 24849 6c348a23 24847->24849 24850->24847 24851 6c3489f8 std::ios_base::_Ios_base_dtor 24850->24851 24853 6c348303 24852->24853 24854 6c34810c __fread_nolock 24852->24854 24853->24843 24855 6c348122 Process32FirstW 24854->24855 24856 6c348146 std::ios_base::_Ios_base_dtor _Yarn _strlen 24855->24856 24857 6c3482fc CloseHandle 24855->24857 24858 6c348150 WideCharToMultiByte 24856->24858 24859 6c34831d 24856->24859 24861 6c348322 24856->24861 24863 6c34aa0e RaiseException EnterCriticalSection LeaveCriticalSection 24856->24863 24865 6c348310 CloseHandle 24856->24865 24866 6c3482e2 Process32NextW 24856->24866 24857->24853 24858->24856 24869 6c3326c0 30 API calls 3 library calls 24859->24869 24862 6c353a5e 29 API calls 24861->24862 24864 6c348327 24862->24864 24863->24856 24865->24853 24866->24857 24866->24858 24867->24836 24868->24850 24869->24861 24870 6c35d63b GetStartupInfoW 24871 6c35d6ec 24870->24871 24872 6c35d658 24870->24872 24872->24871 24876 6c3670d3 24872->24876 24874 6c35d680 24874->24871 24875 6c35d6b0 GetFileType 24874->24875 24875->24874 24877 6c3670df ___scrt_is_nonwritable_in_current_image 24876->24877 24878 6c3670e8 24877->24878 24879 6c367109 24877->24879 24897 6c352f04 14 API calls __dosmaperr 24878->24897 24889 6c353d46 EnterCriticalSection 24879->24889 24882 6c3670ed 24898 6c353a4e 29 API calls __wsopen_s 24882->24898 24884 6c3670f7 24884->24874 24885 6c367141 24899 6c367168 LeaveCriticalSection std::_Lockit::~_Lockit 24885->24899 24887 6c367115 24887->24885 24890 6c367023 24887->24890 24889->24887 24891 6c35cf6f __Getctype 14 API calls 24890->24891 24892 6c367035 24891->24892 24896 6c367042 24892->24896 24900 6c35ca3e 6 API calls std::_Lockit::_Lockit 24892->24900 24894 6c367097 24894->24887 24901 6c35a607 14 API calls __dosmaperr 24896->24901 24897->24882 24898->24884 24899->24884 24900->24892 24901->24894

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 6c336720-6c336728 1 6c33672a-6c336734 0->1 2 6c33676d-6c33676f 0->2 3 6c336736-6c336748 1->3 4 6c33674f-6c336766 call 6c34aa43 1->4 5 6c336770-6c33680e call 6c353a5e CryptAcquireContextW 3->5 6 6c33674a-6c33674d 3->6 4->2 12 6c336814-6c33684e 5->12 13 6c336e09-6c336e67 call 6c34d87e call 6c34d2b3 5->13 6->4 14 6c336850-6c336858 12->14 36 6c336e6a-6c336e8b call 6c336720 * 2 13->36 16 6c3369e8-6c336a08 CryptReleaseContext 14->16 17 6c33685e-6c336874 CryptCreateHash 14->17 22 6c336a0a-6c336a2d call 6c337d60 call 6c34f020 16->22 23 6c336a2f-6c336a38 16->23 19 6c33687a-6c336882 17->19 20 6c336d1c-6c336d88 CryptReleaseContext call 6c34d87e call 6c34d2b3 17->20 25 6c336884-6c336895 CryptHashData 19->25 26 6c33689b-6c3368a1 19->26 20->36 55 6c336a5d-6c336a62 22->55 27 6c336a64-6c336a76 call 6c34f020 23->27 28 6c336a3a-6c336a5a call 6c34f020 * 2 23->28 25->26 32 6c336d8d-6c336e02 CryptDestroyHash CryptReleaseContext call 6c34d87e call 6c34d2b3 25->32 33 6c3368a3-6c3368a6 26->33 34 6c3368ad-6c3368b3 26->34 52 6c336a79-6c336a93 27->52 28->55 32->36 33->34 40 6c3368b7-6c3368d6 call 6c337650 34->40 41 6c3368b5 34->41 65 6c3368e7-6c3368fe CryptHashData 40->65 66 6c3368d8-6c3368e2 call 6c337840 40->66 41->40 59 6c336ab1-6c336aba 52->59 60 6c336a95-6c336aaf call 6c337d60 52->60 55->52 63 6c336aef-6c336afc call 6c34f020 59->63 64 6c336abc-6c336ae2 call 6c34f020 59->64 74 6c336ae3-6c336aed call 6c34f020 60->74 85 6c336aff-6c336b07 63->85 64->74 72 6c336904-6c336929 CryptGetHashParam 65->72 73 6c336c5a-6c336cb6 CryptDestroyHash CryptReleaseContext call 6c34d87e call 6c34d2b3 65->73 66->65 77 6c336cbb-6c336d17 CryptDestroyHash CryptReleaseContext call 6c34d87e call 6c34d2b3 72->77 78 6c33692f-6c33694a 72->78 73->36 74->85 77->36 80 6c336960 78->80 81 6c33694c 78->81 88 6c336962-6c336969 80->88 89 6c336980-6c3369a1 CryptGetHashParam CryptDestroyHash 80->89 86 6c33694e-6c336951 81->86 92 6c336b35-6c336b3a 85->92 93 6c336b09-6c336b13 85->93 86->89 95 6c3369d4-6c3369e3 call 6c34f5a0 88->95 96 6c33696b-6c336978 call 6c337a40 88->96 100 6c336c02-6c336c55 CryptReleaseContext call 6c34d87e call 6c34d2b3 89->100 101 6c3369a7-6c3369cf call 6c337b50 89->101 97 6c336b76-6c336b7e 92->97 98 6c336b3c-6c336b46 92->98 102 6c336b15-6c336b20 93->102 103 6c336b2b-6c336b32 call 6c34aa43 93->103 95->86 96->89 111 6c336b80-6c336b8d 97->111 112 6c336baf-6c336bb4 97->112 106 6c336b65-6c336b6f call 6c34aa43 98->106 107 6c336b48-6c336b53 98->107 100->36 101->14 114 6c336b26-6c336b29 102->114 115 6c336e04 call 6c353a5e 102->115 103->92 106->97 107->115 121 6c336b59-6c336b63 107->121 125 6c336ba5-6c336bac call 6c34aa43 111->125 126 6c336b8f-6c336b9a 111->126 117 6c336bb6-6c336bc0 112->117 118 6c336bee-6c336c01 112->118 114->103 115->13 128 6c336bc2-6c336bd9 117->128 129 6c336be4-6c336beb call 6c34aa43 117->129 121->106 125->112 126->115 132 6c336ba0-6c336ba3 126->132 128->115 135 6c336bdf-6c336be2 128->135 129->118 132->125 135->129
                                              APIs
                                              • CryptAcquireContextW.ADVAPI32 ref: 6C336806
                                              • CryptCreateHash.ADVAPI32(00000000,00008003,00000000,00000000,00000000), ref: 6C33686C
                                              • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000), ref: 6C33688D
                                              • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 6C3368F6
                                              • CryptGetHashParam.ADVAPI32(00000000,00000004,00000000,00000004,00000000), ref: 6C336921
                                              • CryptGetHashParam.ADVAPI32(00000000,00000002,00000000,00000000,00000000), ref: 6C33698E
                                              • CryptDestroyHash.ADVAPI32(00000000), ref: 6C336999
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Crypt$Hash$DataParam$AcquireContextCreateDestroy
                                              • String ID: P~3l$g97l$o87l
                                              • API String ID: 2113037386-3495962359
                                              • Opcode ID: 418b70e14e0c4ab1bb41efd76f95e4ed99f6c8a7d9f243ee05561af118aa2dd7
                                              • Instruction ID: e5ae932533542d555b053e3c54b24e42cba4647d8dd8fdc2908a589d79d5aea2
                                              • Opcode Fuzzy Hash: 418b70e14e0c4ab1bb41efd76f95e4ed99f6c8a7d9f243ee05561af118aa2dd7
                                              • Instruction Fuzzy Hash: A02249B2E002689FDF14CFA4CD45BEEBBB9BF49304F148158E509A7740DB7599488FA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 139 6c336eb0-6c336f1b call 6c336520 142 6c336f65-6c336fd6 call 6c336780 CryptAcquireContextW 139->142 143 6c336f1d-6c336f2e 139->143 149 6c3373c2-6c337425 call 6c34d87e call 6c34d2b3 142->149 150 6c336fdc-6c33702c CryptImportKey 142->150 143->142 144 6c336f30-6c336f62 call 6c337b50 call 6c34f020 143->144 144->142 171 6c3375cc-6c3375d3 call 6c3326c0 149->171 153 6c337032-6c337044 CryptSetKeyParam 150->153 154 6c33742a-6c33748f CryptReleaseContext call 6c34d87e call 6c34d2b3 150->154 158 6c337494-6c337502 CryptDestroyKey CryptReleaseContext call 6c34d87e call 6c34d2b3 153->158 159 6c33704a-6c33706a CryptSetKeyParam 153->159 154->171 158->171 163 6c337070-6c33709e 159->163 164 6c337507-6c337572 CryptDestroyKey CryptReleaseContext call 6c34d87e call 6c34d2b3 159->164 166 6c3370d3-6c3370d5 163->166 167 6c3370a0-6c3370a2 163->167 164->171 175 6c337115-6c337141 CryptDecrypt CryptDestroyKey CryptReleaseContext 166->175 172 6c3375d8-6c3375f3 call 6c337640 call 6c336720 167->172 173 6c3370a8-6c3370b1 167->173 171->172 178 6c3370b3-6c3370d1 call 6c34aa0e 173->178 179 6c3370d7-6c3370e0 call 6c34aa0e 173->179 183 6c337147-6c337156 175->183 184 6c337574-6c3375c9 call 6c34d87e call 6c34d2b3 175->184 202 6c3370e2-6c337112 call 6c34f020 178->202 179->202 190 6c337161 183->190 191 6c337158-6c33715f 183->191 184->171 193 6c337163-6c33716a 190->193 194 6c3371a8-6c3371c4 190->194 191->194 199 6c337188-6c3371a6 call 6c34f5a0 193->199 200 6c33716c-6c337186 call 6c337a40 193->200 194->171 203 6c3371ca-6c3371cd 194->203 199->194 200->194 202->175 208 6c3371ea-6c337210 203->208 209 6c3371cf-6c3371e8 call 6c34f020 203->209 215 6c337212-6c337229 call 6c34aa0e 208->215 216 6c33722b-6c337237 call 6c34aa0e 208->216 221 6c33725a-6c337262 209->221 223 6c337239-6c337258 call 6c34f020 215->223 216->223 224 6c337264-6c33726e 221->224 225 6c33729b-6c3372a0 221->225 223->221 227 6c337291-6c337298 call 6c34aa43 224->227 228 6c337270-6c337286 224->228 229 6c3372a2-6c3372b6 225->229 230 6c3372eb-6c3372f0 225->230 227->225 234 6c3373bd call 6c353a5e 228->234 235 6c33728c-6c33728f 228->235 237 6c3372da-6c3372e4 call 6c34aa43 229->237 238 6c3372b8-6c3372cf 229->238 232 6c3372f2-6c337306 230->232 233 6c337336-6c33733b 230->233 241 6c337325-6c33732f call 6c34aa43 232->241 242 6c337308-6c337313 232->242 244 6c337378-6c33737d 233->244 245 6c33733d-6c337347 233->245 234->149 235->227 237->230 238->234 239 6c3372d5-6c3372d8 238->239 239->237 241->233 242->234 250 6c337319-6c337323 242->250 248 6c3373a7-6c3373bc 244->248 249 6c33737f-6c337389 244->249 252 6c337367-6c337371 call 6c34aa43 245->252 253 6c337349-6c337360 245->253 255 6c33738b-6c337396 249->255 256 6c33739d-6c3373a4 call 6c34aa43 249->256 250->241 252->244 253->234 258 6c337362-6c337365 253->258 255->234 260 6c337398-6c33739b 255->260 256->248 258->252 260->256
                                              APIs
                                                • Part of subcall function 6C336520: CryptStringToBinaryA.CRYPT32(n3l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C336570
                                                • Part of subcall function 6C336520: CryptStringToBinaryA.CRYPT32(n3l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C33660E
                                              • CryptAcquireContextW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000008), ref: 6C336FCE
                                              • CryptImportKey.ADVAPI32(00000000,00000208,00000014,00000000,00000000,00000000), ref: 6C337024
                                              • CryptSetKeyParam.ADVAPI32(00000000,00000001,00000000,00000000), ref: 6C33703C
                                              • CryptSetKeyParam.ADVAPI32(00000000,00000004,00000001,00000000), ref: 6C337062
                                              • CryptDecrypt.ADVAPI32(00000000,00000000,00000001,00000000,00000000,?), ref: 6C337123
                                              • CryptDestroyKey.ADVAPI32(00000000), ref: 6C33712E
                                              • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C337139
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 6C3373FF
                                                • Part of subcall function 6C34D2B3: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?), ref: 6C34D314
                                                • Part of subcall function 6C3326C0: _strlen.LIBCMT ref: 6C332718
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Crypt$BinaryContextParamString$AcquireDecryptDestroyExceptionImportRaiseRelease___std_exception_copy_strlen
                                              • String ID: 497l$O97l$Salt$ed__$o87l
                                              • API String ID: 1577403515-4179348176
                                              • Opcode ID: 252e37c3c632ade2a95475639873fa15585028603c9fd8b2e374e350d009f286
                                              • Instruction ID: cb3713d2182d6ce0f3c1f08459c5571b7853f2e354907cb736311ddde6d25573
                                              • Opcode Fuzzy Hash: 252e37c3c632ade2a95475639873fa15585028603c9fd8b2e374e350d009f286
                                              • Instruction Fuzzy Hash: 9322B1B2D102689FEB14CFA4CD45BEEBBB5EF45304F148158E409BB780DB7599488FA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 576 6c3480f0-6c348106 CreateToolhelp32Snapshot 577 6c348303 576->577 578 6c34810c-6c348140 call 6c34f5a0 Process32FirstW 576->578 579 6c348305-6c34830f 577->579 582 6c348146-6c34814d 578->582 583 6c3482fc-6c3482fd CloseHandle 578->583 584 6c348150-6c348195 WideCharToMultiByte call 6c3557a0 582->584 583->577 587 6c34831d call 6c3326c0 584->587 588 6c34819b-6c3481a0 584->588 595 6c348322-6c348327 call 6c353a5e 587->595 589 6c3481d0-6c3481d8 588->589 590 6c3481a2-6c3481c6 call 6c34f020 588->590 593 6c3481df-6c3481e5 589->593 594 6c3481da 589->594 600 6c34823f-6c34825f 590->600 597 6c3481e7-6c348203 call 6c34aa0e 593->597 598 6c348210-6c34821c call 6c34aa0e 593->598 594->593 610 6c34821e-6c34823b call 6c34f020 597->610 598->610 604 6c348264-6c348266 600->604 605 6c348261 600->605 608 6c348290-6c348295 604->608 609 6c348268-6c34826a 604->609 605->604 613 6c348297 608->613 614 6c3482a0-6c3482a9 608->614 611 6c34826c-6c34827f call 6c34dc4d 609->611 612 6c348299-6c34829e 609->612 610->600 611->614 627 6c348281 611->627 612->614 617 6c3482de-6c3482e0 612->617 613->617 618 6c3482d0 614->618 619 6c3482ab-6c3482b6 614->619 621 6c348310-6c34831b CloseHandle 617->621 622 6c3482e2-6c3482f6 Process32NextW 617->622 625 6c3482d2-6c3482dc call 6c34aa43 618->625 619->595 624 6c3482b8-6c3482c1 619->624 621->579 622->583 622->584 624->625 625->617 627->617
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6C3480FE
                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 6C348139
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6C34816C
                                              • _strlen.LIBCMT ref: 6C34818B
                                              • Process32NextW.KERNEL32(?,?), ref: 6C3482EF
                                              • CloseHandle.KERNELBASE(00000000), ref: 6C3482FD
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000), ref: 6C348313
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: CloseHandleProcess32$ByteCharCreateFirstMultiNextSnapshotToolhelp32Wide_strlen
                                              • String ID:
                                              • API String ID: 1292832681-0
                                              • Opcode ID: 4e757d2a0d14269b46b2669a5fb9283193663e2e0f64c81a387848ab48e45494
                                              • Instruction ID: 0a5c47613a77c0d310372981eff421182ab4cafd584b3d226b406795516d27a2
                                              • Opcode Fuzzy Hash: 4e757d2a0d14269b46b2669a5fb9283193663e2e0f64c81a387848ab48e45494
                                              • Instruction Fuzzy Hash: 9051F9729053109BE3109E64DC80BDF77D9AF89318F15892AE999D7681E731E9088FE3

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 263 6c348a70-6c348b30 call 6c346110 266 6c348b34-6c348b46 263->266 267 6c348b32 263->267 268 6c348b78-6c348b8a 266->268 269 6c348b48-6c348b76 call 6c332c20 266->269 267->266 270 6c348b92-6c348ba9 call 6c34f020 268->270 271 6c348b8c 268->271 276 6c348baf-6c348bda 269->276 270->276 271->270 277 6c348bdc-6c348beb 276->277 278 6c348c1a-6c348c3e 276->278 279 6c348c10-6c348c17 call 6c34aa43 277->279 280 6c348bed-6c348c03 277->280 281 6c348c40-6c348c4f 278->281 282 6c348c7e-6c348c87 278->282 279->278 285 6c348c09-6c348c0e 280->285 286 6c3491ea call 6c353a5e 280->286 288 6c348c74-6c348c7b call 6c34aa43 281->288 289 6c348c51-6c348c67 281->289 283 6c348cc3-6c348cc7 282->283 284 6c348c89-6c348c98 282->284 294 6c348cce 283->294 295 6c348cc9-6c348ccc 283->295 291 6c348cb9-6c348cc0 call 6c34aa43 284->291 292 6c348c9a-6c348ca5 284->292 285->279 300 6c3491ef-6c349216 call 6c3326c0 call 6c3329d0 286->300 288->282 289->286 297 6c348c6d-6c348c72 289->297 291->283 292->286 299 6c348cab-6c348cb7 292->299 302 6c348cd1-6c348cdb GetFileAttributesA 294->302 295->302 297->288 299->291 305 6c349197-6c34919d 302->305 306 6c348ce1-6c348cf7 SHGetFolderPathA 302->306 308 6c3491d6-6c3491e9 305->308 309 6c34919f-6c3491ab 305->309 306->305 310 6c348cfd-6c348d1d call 6c3557a0 306->310 312 6c3491cc-6c3491d3 call 6c34aa43 309->312 313 6c3491ad-6c3491c3 309->313 310->300 320 6c348d23-6c348d28 310->320 312->308 313->286 318 6c3491c5-6c3491ca 313->318 318->312 321 6c348d49-6c348d6c 320->321 322 6c348d2a-6c348d47 call 6c34f020 320->322 324 6c348d8d-6c348d9f call 6c34aa0e 321->324 325 6c348d6e-6c348d8b call 6c34aa0e 321->325 329 6c348dc3-6c348dce 322->329 334 6c348da1-6c348dc1 call 6c34f020 324->334 325->334 332 6c348dd0-6c348e0a call 6c332c20 329->332 333 6c348e0c-6c348e2a 329->333 340 6c348e37-6c348e69 332->340 336 6c348e2c 333->336 337 6c348e2f-6c348e33 333->337 334->329 336->337 337->340 342 6c348e6d-6c348e7f 340->342 343 6c348e6b 340->343 344 6c348eb0-6c348ec1 342->344 345 6c348e81-6c348eae call 6c332c20 342->345 343->342 347 6c348ec3 344->347 348 6c348ec9-6c348ed8 call 6c34f020 344->348 352 6c348edc-6c348f17 345->352 347->348 348->352 353 6c348f4f-6c348f63 352->353 354 6c348f19-6c348f4d call 6c332c20 352->354 356 6c348f65 353->356 357 6c348f6b-6c348f72 353->357 359 6c348f77-6c348fa2 354->359 356->357 357->359 360 6c348fa4-6c348fb3 359->360 361 6c348fd7-6c348ffb 359->361 364 6c348fb5-6c348fc0 360->364 365 6c348fcd-6c348fd4 call 6c34aa43 360->365 362 6c349030-6c349051 361->362 363 6c348ffd-6c34900c 361->363 368 6c349083-6c349087 362->368 369 6c349053-6c34905f 362->369 366 6c349026-6c34902d call 6c34aa43 363->366 367 6c34900e-6c349019 363->367 364->286 370 6c348fc6-6c348fcb 364->370 365->361 366->362 367->286 372 6c34901f-6c349024 367->372 376 6c34908e 368->376 377 6c349089-6c34908c 368->377 374 6c349061-6c34906c 369->374 375 6c349079-6c349080 call 6c34aa43 369->375 370->365 372->366 374->286 381 6c349072-6c349077 374->381 375->368 379 6c349091-6c34909b GetFileAttributesA 376->379 377->379 383 6c3490a1-6c3490c3 CoInitialize CoCreateInstance 379->383 384 6c349163-6c349169 379->384 381->375 386 6c34915d CoUninitialize 383->386 387 6c3490c9-6c3490cd 383->387 384->305 388 6c34916b-6c349177 384->388 386->384 389 6c3490d4 387->389 390 6c3490cf-6c3490d2 387->390 391 6c34918d-6c349194 call 6c34aa43 388->391 392 6c349179-6c349184 388->392 393 6c3490d7-6c349116 MultiByteToWideChar 389->393 390->393 391->305 392->286 394 6c349186-6c34918b 392->394 399 6c349154-6c349159 393->399 400 6c349118-6c34911c 393->400 394->391 399->386 401 6c349123 400->401 402 6c34911e-6c349121 400->402 403 6c349126-6c349147 MultiByteToWideChar 401->403 402->403 404 6c34914b-6c349150 403->404 404->399
                                              APIs
                                              • GetFileAttributesA.KERNELBASE(?), ref: 6C348CD2
                                              • SHGetFolderPathA.SHELL32 ref: 6C348CEF
                                              • _strlen.LIBCMT ref: 6C348D13
                                              • GetFileAttributesA.KERNELBASE(?), ref: 6C349092
                                              • CoInitialize.OLE32(00000000), ref: 6C3490A3
                                              • CoCreateInstance.OLE32(6C36F3C0,00000000,00000001,6C36EC50,?), ref: 6C3490BB
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6C3490EA
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000104), ref: 6C349139
                                              • CoUninitialize.COMBASE ref: 6C34915D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: AttributesByteCharFileMultiWide$CreateFolderInitializeInstancePathUninitialize_strlen
                                              • String ID: \$e\$n77l
                                              • API String ID: 1074249417-3071153672
                                              • Opcode ID: 20c8b36e2010781c4c8ad409d54c909b3f802f8c802f6941ac6bfe78e89c5f91
                                              • Instruction ID: 021c2c72b71e86ed558a482b92916d32cf7bbfa3cdd64603b86fdcaf27a9e4de
                                              • Opcode Fuzzy Hash: 20c8b36e2010781c4c8ad409d54c909b3f802f8c802f6941ac6bfe78e89c5f91
                                              • Instruction Fuzzy Hash: 4B32E171D042688FDB24CF24C8887EEBBB5FF45304F148699E459AB691DB319E84CF92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 405 6c349b10-6c349b84 call 6c331a30 call 6c3493e0 call 6c3557a0 412 6c349b86-6c349bb0 call 6c332c20 405->412 413 6c349bb2-6c349bbc 405->413 419 6c349bd5-6c349c14 call 6c347590 412->419 415 6c349bc1-6c349bd1 call 6c34f020 413->415 416 6c349bbe 413->416 415->419 416->415 423 6c349c16-6c349c2b 419->423 424 6c349c4f-6c349c67 419->424 425 6c349c45-6c349c4c call 6c34aa43 423->425 426 6c349c2d-6c349c38 423->426 427 6c349ca3-6c349ca7 424->427 428 6c349c69-6c349c7f 424->428 425->424 429 6c349f77-6c349f93 call 6c353a5e call 6c3329d0 426->429 430 6c349c3e-6c349c43 426->430 434 6c349de3-6c349dea 427->434 435 6c349cad-6c349ce4 call 6c347eb0 call 6c3493e0 call 6c3557a0 427->435 432 6c349c81-6c349c8c 428->432 433 6c349c99-6c349ca0 call 6c34aa43 428->433 430->425 432->429 438 6c349c92-6c349c97 432->438 433->427 440 6c349e27-6c349e3e CreateThread 434->440 441 6c349dec-6c349e0c call 6c348a70 434->441 470 6c349ce6-6c349d0b call 6c332c20 435->470 471 6c349d0d-6c349d1a 435->471 438->433 445 6c349e40-6c349e53 WaitForSingleObject 440->445 446 6c349eb3-6c349f72 call 6c3496a0 call 6c3492f0 call 6c346410 call 6c3499f0 call 6c3329d0 call 6c337e80 call 6c348000 CreateThread call 6c346840 call 6c352583 440->446 454 6c349e13-6c349e21 CreateThread 441->454 455 6c349e0e 441->455 445->446 452 6c349e55-6c349e62 CloseHandle 445->452 446->429 458 6c349e64-6c349e70 452->458 459 6c349e9a-6c349eb2 452->459 454->440 455->454 463 6c349e90-6c349e97 call 6c34aa43 458->463 464 6c349e72-6c349e7d 458->464 463->459 464->429 467 6c349e83-6c349e8e 464->467 467->463 481 6c349d33-6c349d5b 470->481 475 6c349d1c 471->475 476 6c349d1f-6c349d30 call 6c34f020 471->476 475->476 476->481 484 6c349d8d-6c349d9d call 6c355185 481->484 485 6c349d5d-6c349d69 481->485 492 6c349da2-6c349da8 484->492 488 6c349d83-6c349d8a call 6c34aa43 485->488 489 6c349d6b-6c349d76 485->489 488->484 489->429 490 6c349d7c-6c349d81 489->490 490->488 492->434 495 6c349daa-6c349db3 492->495 497 6c349db5-6c349dcc 495->497 498 6c349dd9-6c349de0 call 6c34aa43 495->498 497->429 500 6c349dd2-6c349dd7 497->500 498->434 500->498
                                              APIs
                                                • Part of subcall function 6C3493E0: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C34941E
                                                • Part of subcall function 6C3493E0: _strlen.LIBCMT ref: 6C34943A
                                              • _strlen.LIBCMT ref: 6C349B62
                                              • _strlen.LIBCMT ref: 6C349CD0
                                              • CreateThread.KERNELBASE(00000000,00000000,6C348770,6C37C338,00000000,00000000), ref: 6C349E21
                                              • CreateThread.KERNELBASE(00000000,00000000,6C3480E0,00000000,00000000,00000000), ref: 6C349E36
                                              • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6C349E48
                                              • CloseHandle.KERNEL32(00000000), ref: 6C349E56
                                              • CreateThread.KERNEL32(00000000,00000000,6C342090,00000000,00000000,00000000), ref: 6C349F65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: CreateThread_strlen$CloseFileHandleModuleNameObjectSingleWait
                                              • String ID: IiViS$Update.d$Update.d$dll
                                              • API String ID: 632893256-1826472805
                                              • Opcode ID: cbff4a451190c49101418b1fbedbca131f882dd17d153b03df9d482814a39db6
                                              • Instruction ID: c1a1dadf4110e5df045812989950a3f9e6dd23cfebac086fa9eb2a548d14c065
                                              • Opcode Fuzzy Hash: cbff4a451190c49101418b1fbedbca131f882dd17d153b03df9d482814a39db6
                                              • Instruction Fuzzy Hash: E9D136B2D003089BDB14DFA4DD44BEEB7F9AF45304F148528E456A7780E775AA88CF92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 507 6c369be7-6c369c17 call 6c36a081 510 6c369c32-6c369c3e call 6c366ded 507->510 511 6c369c19-6c369c24 call 6c352f17 507->511 517 6c369c57-6c369ca0 call 6c369fec 510->517 518 6c369c40-6c369c55 call 6c352f17 call 6c352f04 510->518 516 6c369c26-6c369c2d call 6c352f04 511->516 527 6c369f0c-6c369f10 516->527 525 6c369ca2-6c369cab 517->525 526 6c369d0d-6c369d16 GetFileType 517->526 518->516 529 6c369ce2-6c369d08 GetLastError call 6c352f2a 525->529 530 6c369cad-6c369cb1 525->530 531 6c369d5f-6c369d62 526->531 532 6c369d18-6c369d49 GetLastError call 6c352f2a CloseHandle 526->532 529->516 530->529 536 6c369cb3-6c369ce0 call 6c369fec 530->536 534 6c369d64-6c369d69 531->534 535 6c369d6b-6c369d71 531->535 532->516 546 6c369d4f-6c369d5a call 6c352f04 532->546 539 6c369d75-6c369dc3 call 6c366f91 534->539 535->539 540 6c369d73 535->540 536->526 536->529 550 6c369dc5-6c369dd1 call 6c36a1fb 539->550 551 6c369de2-6c369e0a call 6c36a2a5 539->551 540->539 546->516 550->551 558 6c369dd3 550->558 556 6c369e0f-6c369e50 551->556 557 6c369e0c-6c369e0d 551->557 560 6c369e52-6c369e56 556->560 561 6c369e71-6c369e7f 556->561 559 6c369dd5-6c369ddd call 6c360ec2 557->559 558->559 559->527 560->561 562 6c369e58-6c369e6c 560->562 563 6c369e85-6c369e89 561->563 564 6c369f0a 561->564 562->561 563->564 566 6c369e8b-6c369ebe CloseHandle call 6c369fec 563->566 564->527 570 6c369ef2-6c369f06 566->570 571 6c369ec0-6c369eec GetLastError call 6c352f2a call 6c366f00 566->571 570->564 571->570
                                              APIs
                                                • Part of subcall function 6C369FEC: CreateFileW.KERNELBASE(FFFFFFFF,00000000,?,6C369C90,?,?,00000000,?,6C369C90,FFFFFFFF,0000000C), ref: 6C36A009
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C369CFB
                                              • __dosmaperr.LIBCMT ref: 6C369D02
                                              • GetFileType.KERNELBASE(00000000), ref: 6C369D0E
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C369D18
                                              • __dosmaperr.LIBCMT ref: 6C369D21
                                              • CloseHandle.KERNEL32(00000000), ref: 6C369D41
                                              • CloseHandle.KERNEL32(6C3607FB), ref: 6C369E8E
                                              • GetLastError.KERNEL32 ref: 6C369EC0
                                              • __dosmaperr.LIBCMT ref: 6C369EC7
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                              • String ID:
                                              • API String ID: 4237864984-0
                                              • Opcode ID: 482c49ab1bb09a266e87811d19ab21f71dd9fa7e95966eba02c07ff6ff42cca1
                                              • Instruction ID: 5fc6f386466d87adb1ccabc5e722348163f0adf1f6ee9e506b94a89a618d0d7d
                                              • Opcode Fuzzy Hash: 482c49ab1bb09a266e87811d19ab21f71dd9fa7e95966eba02c07ff6ff42cca1
                                              • Instruction Fuzzy Hash: FCA13632A242559FCF0A9F69DC51B9D3BB4EB07318F14025AE811DFB94C7368816CF66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 629 6c3621f6-6c362206 630 6c362220-6c362222 629->630 631 6c362208-6c36221b call 6c352f17 call 6c352f04 629->631 633 6c362562-6c36256f call 6c352f17 call 6c352f04 630->633 634 6c362228-6c36222e 630->634 645 6c36257a 631->645 652 6c362575 call 6c353a4e 633->652 634->633 637 6c362234-6c36225d 634->637 637->633 640 6c362263-6c36226c 637->640 643 6c362286-6c362288 640->643 644 6c36226e-6c362281 call 6c352f17 call 6c352f04 640->644 648 6c36255e-6c362560 643->648 649 6c36228e-6c362292 643->649 644->652 651 6c36257d-6c362580 645->651 648->651 649->648 650 6c362298-6c36229c 649->650 650->644 654 6c36229e-6c3622b5 650->654 652->645 657 6c3622b7-6c3622ba 654->657 658 6c3622ea-6c3622f0 654->658 660 6c3622e0-6c3622e8 657->660 661 6c3622bc-6c3622c2 657->661 662 6c3622c4-6c3622db call 6c352f17 call 6c352f04 call 6c353a4e 658->662 663 6c3622f2-6c3622f9 658->663 665 6c36235d-6c36237c 660->665 661->660 661->662 694 6c362495 662->694 666 6c3622fd-6c36231b call 6c35a641 call 6c35a607 * 2 663->666 667 6c3622fb 663->667 670 6c362382-6c36238e 665->670 671 6c362438-6c362441 call 6c3671c6 665->671 698 6c36231d-6c362333 call 6c352f04 call 6c352f17 666->698 699 6c362338-6c36235b call 6c35fcdb 666->699 667->666 670->671 672 6c362394-6c362396 670->672 683 6c3624b2 671->683 684 6c362443-6c362455 671->684 672->671 676 6c36239c-6c3623bd 672->676 676->671 680 6c3623bf-6c3623d5 676->680 680->671 685 6c3623d7-6c3623d9 680->685 687 6c3624b6-6c3624cc ReadFile 683->687 684->683 689 6c362457-6c362466 GetConsoleMode 684->689 685->671 690 6c3623db-6c3623fe 685->690 692 6c3624ce-6c3624d4 687->692 693 6c36252a-6c362535 GetLastError 687->693 689->683 695 6c362468-6c36246c 689->695 690->671 697 6c362400-6c362416 690->697 692->693 702 6c3624d6 692->702 700 6c362537-6c362549 call 6c352f04 call 6c352f17 693->700 701 6c36254e-6c362551 693->701 696 6c362498-6c3624a2 call 6c35a607 694->696 695->687 703 6c36246e-6c362486 ReadConsoleW 695->703 696->651 697->671 707 6c362418-6c36241a 697->707 698->694 699->665 700->694 704 6c362557-6c362559 701->704 705 6c36248e-6c362494 call 6c352f2a 701->705 711 6c3624d9-6c3624eb 702->711 712 6c3624a7-6c3624b0 703->712 713 6c362488 GetLastError 703->713 704->696 705->694 707->671 716 6c36241c-6c362433 707->716 711->696 720 6c3624ed-6c3624f1 711->720 712->711 713->705 716->671 724 6c3624f3-6c362503 call 6c3625ff 720->724 725 6c36250a-6c362517 720->725 734 6c362506-6c362508 724->734 726 6c362523-6c362528 call 6c3628a3 725->726 727 6c362519 call 6c362581 725->727 735 6c36251e-6c362521 726->735 727->735 734->696 735->734
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7bb436900293f422af9a0cb7d844a028a6d4de1adb324fc037db130770a9a446
                                              • Instruction ID: 727c3a7f8ef1859e5efd4b4f189a5902f8611429183534661d23e6d3601be659
                                              • Opcode Fuzzy Hash: 7bb436900293f422af9a0cb7d844a028a6d4de1adb324fc037db130770a9a446
                                              • Instruction Fuzzy Hash: E2B104B0A04249AFDB02CF9AC948FADBBB4BF0A318F554158E550ABF85C7739941CF61

                                              Control-flow Graph

                                              APIs
                                              • GetCommandLineW.KERNEL32(00000001), ref: 00131C61
                                              • CommandLineToArgvW.SHELL32(00000000), ref: 00131C68
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00130000), ref: 00131CD3
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 00131CF3
                                              • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00130000,00000000,00000000,00000000,00132778,00000014), ref: 00131D25
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
                                              • String ID:
                                              • API String ID: 4060259846-0
                                              • Opcode ID: 4956ab1caf7819abda58af7365cf0c086a3ca42ad846ab57c24cb85b8b394724
                                              • Instruction ID: 649ae20b95bd56f1931b0a79ad22e19e3d988bb5bf5b4a4928442de90589d3d1
                                              • Opcode Fuzzy Hash: 4956ab1caf7819abda58af7365cf0c086a3ca42ad846ab57c24cb85b8b394724
                                              • Instruction Fuzzy Hash: 1931CF70604305BBE714EF68AC49B1B77E8EF85711F10492CF95AAB2C0D734ED088B62

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 757 6c34d04e-6c34d05f call 6c34c970 760 6c34d070-6c34d077 757->760 761 6c34d061-6c34d067 757->761 763 6c34d083-6c34d097 dllmain_raw 760->763 764 6c34d079-6c34d07c 760->764 761->760 762 6c34d069-6c34d06b 761->762 765 6c34d149-6c34d158 762->765 767 6c34d140-6c34d147 763->767 768 6c34d09d-6c34d0ae dllmain_crt_dispatch 763->768 764->763 766 6c34d07e-6c34d081 764->766 769 6c34d0b4-6c34d0c6 call 6c34d214 766->769 767->765 768->767 768->769 772 6c34d0ef-6c34d0f1 769->772 773 6c34d0c8-6c34d0ca 769->773 775 6c34d0f3-6c34d0f6 772->775 776 6c34d0f8-6c34d109 dllmain_crt_dispatch 772->776 773->772 774 6c34d0cc-6c34d0ea call 6c34d214 call 6c34cf22 dllmain_raw 773->774 774->772 775->767 775->776 776->767 778 6c34d10b-6c34d13d dllmain_raw 776->778 778->767
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: dllmain_raw$dllmain_crt_dispatch
                                              • String ID:
                                              • API String ID: 3136044242-0
                                              • Opcode ID: df9986265894962fddf3ca9acd36b0b2bd225875b2facc15afc393bf79b2fcfb
                                              • Instruction ID: 3f041b8714e1bd625dfc36f78e117cb37742c50dbbd24724d841053fd50b2339
                                              • Opcode Fuzzy Hash: df9986265894962fddf3ca9acd36b0b2bd225875b2facc15afc393bf79b2fcfb
                                              • Instruction Fuzzy Hash: 04218E72E05619EBDF219E56C840AEF3AF9EB81A99F11C119FC145BA10C7368D068FE1

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen$Sleep
                                              • String ID:
                                              • API String ID: 2737124692-0
                                              • Opcode ID: b47f16611eb9a4334e22bb4a2342b826c1662bec2b243807f09aca83456489d1
                                              • Instruction ID: 8d9e3a9a7aef839e418ee1f1f4c68bcbeb721dcfb203b11edd1347b7fc1e5371
                                              • Opcode Fuzzy Hash: b47f16611eb9a4334e22bb4a2342b826c1662bec2b243807f09aca83456489d1
                                              • Instruction Fuzzy Hash: 406104B2C112149BDB10CF64DC407DE7BF2AF49314F15422AE855EB781E7769A488BE2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 844 6c36357e-6c36358e DeleteFileW 845 6c3635a2-6c3635a5 844->845 846 6c363590-6c3635a1 GetLastError call 6c352f2a 844->846
                                              APIs
                                              • DeleteFileW.KERNELBASE(6C3551D8,?,6C3551D8,?,?,?,0000000F), ref: 6C363586
                                              • GetLastError.KERNEL32(?,6C3551D8,?,?,?,0000000F), ref: 6C363590
                                              • __dosmaperr.LIBCMT ref: 6C363597
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: DeleteErrorFileLast__dosmaperr
                                              • String ID:
                                              • API String ID: 1545401867-0
                                              • Opcode ID: 26f261e70d306c259bc66364acf37c6dfaa6e76ca43c367be72ebacf184203b8
                                              • Instruction ID: 316fc6b3d71eb2f3976132d45fcaf60e37fc3cd990cc12cdf6018a517c00e054
                                              • Opcode Fuzzy Hash: 26f261e70d306c259bc66364acf37c6dfaa6e76ca43c367be72ebacf184203b8
                                              • Instruction Fuzzy Hash: 03D0C932218208778E021BB7EC099163BACDA823793580655F52DC6990EA23C8509965

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 921 6c33a8b0-6c33a8c7 922 6c33a9cd-6c33a9d1 921->922 923 6c33a8cd-6c33a8da 921->923 924 6c33aa78-6c33aa83 922->924 925 6c33a8e0-6c33a8e7 923->925 926 6c33a979-6c33a980 923->926 927 6c33a9d6-6c33a9de 925->927 928 6c33a8ed-6c33a8f4 925->928 929 6c33a982-6c33a989 926->929 930 6c33a9a0-6c33a9aa 926->930 933 6c33a9e0 927->933 934 6c33a9f7-6c33a9ff 927->934 931 6c33a9e5-6c33a9e7 928->931 932 6c33a8fa-6c33a91c call 6c34f020 928->932 929->930 935 6c33a98b-6c33a996 929->935 948 6c33a9b8-6c33a9c8 930->948 949 6c33a9ac-6c33a9b6 930->949 938 6c33a9e9-6c33a9f1 931->938 932->938 937 6c33aa73-6c33aa75 933->937 939 6c33aa01-6c33aa1e 934->939 940 6c33aa20-6c33aa26 934->940 941 6c33a930-6c33a968 call 6c34f020 935->941 942 6c33a998-6c33a99c 935->942 937->924 938->934 938->937 939->940 946 6c33aa4b-6c33aa4d 940->946 947 6c33aa28-6c33aa47 call 6c354922 940->947 950 6c33a96c-6c33a977 941->950 942->941 953 6c33aa71 946->953 954 6c33aa4f-6c33aa59 call 6c354922 946->954 947->940 958 6c33aa49 947->958 948->924 949->950 950->926 950->948 953->937 957 6c33aa5e-6c33aa6f 954->957 957->937 958->937
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: __fread_nolock
                                              • String ID:
                                              • API String ID: 2638373210-0
                                              • Opcode ID: bb58a6a0a802cbbd7d4787d1b2aa3885e63c8cef58e2f1b244c96a4b348c1e1e
                                              • Instruction ID: 5d629f3c16179e10b06c68dda2b968bf3e7729ca8b101ea7751b40909e5c53de
                                              • Opcode Fuzzy Hash: bb58a6a0a802cbbd7d4787d1b2aa3885e63c8cef58e2f1b244c96a4b348c1e1e
                                              • Instruction Fuzzy Hash: 8251F9327142248FDB048E6DC880B1AB3E5AF89718F16966DF89DDB791D632DC05CF91
                                              APIs
                                                • Part of subcall function 6C353EF1: GetSystemTimeAsFileTime.KERNEL32(6C331A64,?,?,?,?,?,6C331A64,00000000), ref: 6C353F06
                                                • Part of subcall function 6C353EF1: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C353F25
                                              • Sleep.KERNELBASE(00000064), ref: 6C331B6C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Time$FileSleepSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                              • String ID: gfff
                                              • API String ID: 2563648476-1553575800
                                              • Opcode ID: 3803813e318914c933cfe1f61c2e47d066da38ec07581c07cacfe6b00f801559
                                              • Instruction ID: fd039c6a6bb220b3977e165e54c239e365781c953b9fd097d2c0369b06c69de5
                                              • Opcode Fuzzy Hash: 3803813e318914c933cfe1f61c2e47d066da38ec07581c07cacfe6b00f801559
                                              • Instruction Fuzzy Hash: BA51D0B1E002988FDB10CFB9D8047EDBBB8EB45318F449229D019E7B90E7759549CFA2
                                              APIs
                                              • __RTC_Initialize.LIBCMT ref: 6C34CE68
                                                • Part of subcall function 6C34D21A: InitializeSListHead.KERNEL32(6C37CA10,6C34CE72,6C379C08,00000010,6C34D00B,?,00000000,?,00000007,6C379C28,00000010,6C34D01E,?,?,6C34D0A7,?), ref: 6C34D21F
                                              • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6C34CED2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                              • String ID:
                                              • API String ID: 3231365870-0
                                              • Opcode ID: 7cdb234f6a529815f255ff62fc5a053fd17f1cf109cd5b93b19154db8d75f0aa
                                              • Instruction ID: 82acbb7bbcffab9756450163df15c8bf5010cc2254a624e5ff0e86377fbab810
                                              • Opcode Fuzzy Hash: 7cdb234f6a529815f255ff62fc5a053fd17f1cf109cd5b93b19154db8d75f0aa
                                              • Instruction Fuzzy Hash: C221F632245251AADB01BFB8B800BD837E0EB467ADF10C829D48167EC1DB2A544D8E7A
                                              APIs
                                              • __RTC_Initialize.LIBCMT ref: 6C34CF69
                                              • ___scrt_uninitialize_crt.LIBCMT ref: 6C34CF83
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Initialize___scrt_uninitialize_crt
                                              • String ID:
                                              • API String ID: 2442719207-0
                                              • Opcode ID: 6cc6859d54e392b47d4299f57f3820e987fa1e05889962c70a9404c94f3ad034
                                              • Instruction ID: 04eccd7833484ad221cf00c0aaaf6c2232ec22ef4543547031363364456bedb5
                                              • Opcode Fuzzy Hash: 6cc6859d54e392b47d4299f57f3820e987fa1e05889962c70a9404c94f3ad034
                                              • Instruction Fuzzy Hash: 5321EB73A092559BDB01BFB8F4007ED77E4EB0671EF10C52AE05093E81DB7985498F66
                                              APIs
                                              • SetFilePointerEx.KERNELBASE(00000000,00000000,?,00008000,6C33BBBA,00008000,6C3607FB,?,?,?,6C35FD04,6C3607FB,?,00000000,6C33BBBA,?), ref: 6C35FEB8
                                              • GetLastError.KERNEL32(00000000,?,?,?,6C35FD04,6C3607FB,?,00000000,6C33BBBA,?,00000000,00008000,6C3607FB,?,?,6C369C04), ref: 6C35FEC5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorFileLastPointer
                                              • String ID:
                                              • API String ID: 2976181284-0
                                              • Opcode ID: 833df3c94ab6e4111a728dbcd75b9a42db444500b78840dc0c440ac9504d72a8
                                              • Instruction ID: 126ff2cf50920e5afbdb3b533dca3aa127d163dff0c6263f6bab67fa60ecfb0e
                                              • Opcode Fuzzy Hash: 833df3c94ab6e4111a728dbcd75b9a42db444500b78840dc0c440ac9504d72a8
                                              • Instruction Fuzzy Hash: 9E01D632724255AFCF068F59CC09C9E3B79DF8A364B240248F8519B691E672DD51CFA0
                                              APIs
                                                • Part of subcall function 00131721: GetModuleHandleW.KERNEL32(00000000,001311DF,00130000,00000000,00000000,00000000,00132778,00000014), ref: 00131723
                                              • _c_exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00131227
                                              • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000007,00132778,00000014), ref: 00131256
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: HandleModule_c_exit_exit
                                              • String ID:
                                              • API String ID: 750871209-0
                                              • Opcode ID: 16fa93b7bc53292110ca8a16250e65417d72c628d38c51941cfc6685c9766e0c
                                              • Instruction ID: da0304f6755d6c59147d393b8cee0eb2834a93839d6885c26cae73c2266dbc2b
                                              • Opcode Fuzzy Hash: 16fa93b7bc53292110ca8a16250e65417d72c628d38c51941cfc6685c9766e0c
                                              • Instruction Fuzzy Hash: FBE08C32E04249AFCF20ABA8D8023DDB772FB81364F200169D912A3291D73658168A50
                                              APIs
                                              • CloseHandle.KERNELBASE(00000000,?,00000000,?,6C360EE1,6C369DDA,?,00000000,00000000), ref: 6C360F48
                                              • GetLastError.KERNEL32(?,00000000,?,6C360EE1,6C369DDA,?,00000000,00000000), ref: 6C360F52
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: CloseErrorHandleLast
                                              • String ID:
                                              • API String ID: 918212764-0
                                              • Opcode ID: b86a7af8eec176f8a342679510429bb6955a2af0299f5121b34f4729adb4f491
                                              • Instruction ID: 38a9b1cdeae22934cc799ab8973ba46f69bee1bad0ed989731cf7a24caa3ce84
                                              • Opcode Fuzzy Hash: b86a7af8eec176f8a342679510429bb6955a2af0299f5121b34f4729adb4f491
                                              • Instruction Fuzzy Hash: 0511403261C1A026C6061777D94779D27B98B8373CF25034DE818CFDC9DB72844589AD
                                              APIs
                                              • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C3477F3
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Ios_base_dtorstd::ios_base::_
                                              • String ID:
                                              • API String ID: 323602529-0
                                              • Opcode ID: c4f8554bb6d589747a6220af9d5954e78d5bc48bd804fafbab01405605b9be4c
                                              • Instruction ID: c5f9eb1f1f7d7c78ea4379d719d51d6adc3b317bf898a20658e508e06c9cee14
                                              • Opcode Fuzzy Hash: c4f8554bb6d589747a6220af9d5954e78d5bc48bd804fafbab01405605b9be4c
                                              • Instruction Fuzzy Hash: AC8178B1A10B058BD324CF24C880BA6B7E5FF49308F548A2DD49A8BB91E775B548CF91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: feb75da0728d7ca1a008bae15cac59dea2dc1f25612c1e63188c70d64c5195b3
                                              • Instruction ID: 58df3cf373747d399cd9bce60565f90ab62531df2e33912d99f04b430a9976d4
                                              • Opcode Fuzzy Hash: feb75da0728d7ca1a008bae15cac59dea2dc1f25612c1e63188c70d64c5195b3
                                              • Instruction Fuzzy Hash: CF51E670A00144AFDB16CF5AC882E9D7FB5EF89328F248158E8485BB55D372DD41CF95
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: __wsopen_s
                                              • String ID:
                                              • API String ID: 3347428461-0
                                              • Opcode ID: 08f6a73426f04fca25ee2c5cbf46501fb89c8ed7b2cb39a5653b8ad7551d5661
                                              • Instruction ID: afdd3830062541cd6dc22df9f8451a246c21f7067b3a56270e9a9453d103f076
                                              • Opcode Fuzzy Hash: 08f6a73426f04fca25ee2c5cbf46501fb89c8ed7b2cb39a5653b8ad7551d5661
                                              • Instruction Fuzzy Hash: 60118C71A0420AAFCF05DF99E94199B7BF8EF88304F004069F808AB301DB31E911CFA9
                                              APIs
                                              • RtlAllocateHeap.NTDLL(00000008,?,?,?,6C35A8E0,00000001,00000364,?,FFFFFFFF,000000FF,?,?,6C355151,?,6C331A6D,00000000), ref: 6C35CFB0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: AllocateHeap
                                              • String ID:
                                              • API String ID: 1279760036-0
                                              • Opcode ID: 293780066178283a971ec8bd46fd7f4233bce2ba82db8dd5126acd2b63b704c3
                                              • Instruction ID: 3cae409d0d403705385789ee3c5ff76c0839e1bd1985c1c5b82c51ed455d55fd
                                              • Opcode Fuzzy Hash: 293780066178283a971ec8bd46fd7f4233bce2ba82db8dd5126acd2b63b704c3
                                              • Instruction Fuzzy Hash: 50F0B43264552467EB017E26BC04E4BB769AF4AB6CB648122AC14E6980DB23D8248FB1
                                              APIs
                                              • CreateFileW.KERNELBASE(FFFFFFFF,00000000,?,6C369C90,?,?,00000000,?,6C369C90,FFFFFFFF,0000000C), ref: 6C36A009
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 29cb65e0d84d22f5ca0acd173799e95aee9ffaf45cdb460be5fc1fc92273a24d
                                              • Instruction ID: d7ecade76a3149dee31c170d34b98c2ab01fef583c18b64eabd0c807ac28517b
                                              • Opcode Fuzzy Hash: 29cb65e0d84d22f5ca0acd173799e95aee9ffaf45cdb460be5fc1fc92273a24d
                                              • Instruction Fuzzy Hash: 84D06C3210020DBBDF028F84DC06EDA3BAAFB48714F014010BA1856020C732E861EB94
                                              APIs
                                              • TCGamerUpdateMain.UPDATE(?,?), ref: 0013100B
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: GamerMainUpdate
                                              • String ID:
                                              • API String ID: 3533789159-0
                                              • Opcode ID: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                              • Instruction ID: 3cd4bfc08ab38ff0026caf25a823ad7202ad82bfe432bb70977e2ac582a47a0a
                                              • Opcode Fuzzy Hash: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                              • Instruction Fuzzy Hash: 63B092BA56020C7BCB48EAD8EC42C9A339C5A58650F408024FE0C8B341EA36FA9087A1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ce2e7459935cdfe08a582bfbc366dfb97c321af20cd6d6fb775ad492ee6293c2
                                              • Instruction ID: f30b407d400f875ba59d563c802a65a3de42b6f277e61937e708264d4d920fbc
                                              • Opcode Fuzzy Hash: ce2e7459935cdfe08a582bfbc366dfb97c321af20cd6d6fb775ad492ee6293c2
                                              • Instruction Fuzzy Hash: AA61E171A04696DBC704CF69C4806A9F3B5FF46329F109329D06997E80E731E895CFD2
                                              APIs
                                              • Sleep.KERNELBASE(00011D28), ref: 6C3480E5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 1e1c7f1564342ba90119272877fff28494a5d52d3d63205d3e051249fdc5726a
                                              • Instruction ID: 55ef5d8e1f3141aba83289525a9b4e697751658903f29e5fdbaf9c29a79159ed
                                              • Opcode Fuzzy Hash: 1e1c7f1564342ba90119272877fff28494a5d52d3d63205d3e051249fdc5726a
                                              • Instruction Fuzzy Hash: 63A002B17531148647165774580ED86A5E89FAB71274185317311D9144DA744090D939
                                              APIs
                                                • Part of subcall function 6C35A893: GetLastError.KERNEL32(?,?,6C355151,?,6C331A6D,00000000), ref: 6C35A897
                                                • Part of subcall function 6C35A893: SetLastError.KERNEL32(00000000,6C331A6D,00000000), ref: 6C35A939
                                              • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 6C366276
                                              • IsValidCodePage.KERNEL32(00000000), ref: 6C3662B4
                                              • IsValidLocale.KERNEL32(?,00000001), ref: 6C3662C7
                                              • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6C36630F
                                              • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6C36632A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                              • String ID: PX7lE
                                              • API String ID: 415426439-508722490
                                              • Opcode ID: b8a20d8f82bf1f0eb882309079e2e9084da39f2f99e9b7e4e457d4f278bcbf95
                                              • Instruction ID: c319e78e7b489d1edb7c1645f111b8edbe61141a42f2d0f004ad54181e659390
                                              • Opcode Fuzzy Hash: b8a20d8f82bf1f0eb882309079e2e9084da39f2f99e9b7e4e457d4f278bcbf95
                                              • Instruction Fuzzy Hash: 74516071A01215ABEF01DFA6CC40AEE77B8EF05788F204469E960E7954E771DA04CF61
                                              APIs
                                              • CryptStringToBinaryA.CRYPT32(n3l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C336570
                                              • CryptStringToBinaryA.CRYPT32(n3l,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C33660E
                                              • ___std_exception_copy.LIBVCRUNTIME ref: 6C33666D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: BinaryCryptString$___std_exception_copy
                                              • String ID: Failed to calculate base64 decoded size.$P~3l$n3l
                                              • API String ID: 2515837927-3664121082
                                              • Opcode ID: 08457144a9ebc8dcbc96670b07775cbbd0490615610b9c79072a7cf371184ce6
                                              • Instruction ID: f654106dfc9ddd6f8d770d0bfe34d7a34830587b1e42fa055bba2b157b5a79d3
                                              • Opcode Fuzzy Hash: 08457144a9ebc8dcbc96670b07775cbbd0490615610b9c79072a7cf371184ce6
                                              • Instruction Fuzzy Hash: E041AFB1A01358AFEB10CF54CC45BDEBBB8FB04714F144528E909ABB80D775A548CFA2
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001315DC
                                              • memset.VCRUNTIME140(?,00000000,00000003), ref: 00131602
                                              • memset.VCRUNTIME140(?,00000000,00000050), ref: 0013168C
                                              • IsDebuggerPresent.KERNEL32 ref: 001316A8
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001316C8
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 001316D2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                              • String ID:
                                              • API String ID: 1045392073-0
                                              • Opcode ID: a3ff42ac27a78c92dc94110d14e1cac62dfccb370c0567ef118ae23c85b3c419
                                              • Instruction ID: 7e8bacf57c00a20e378c8b6a5ad787ec2a1e305b8531e965d082190f94ff115c
                                              • Opcode Fuzzy Hash: a3ff42ac27a78c92dc94110d14e1cac62dfccb370c0567ef118ae23c85b3c419
                                              • Instruction Fuzzy Hash: 52311875D0121CABDB21EFA4D9897CDBBF8AF18300F1041EAE50DAB250EB719A84CF54
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(00000000,2000000B,6C3662A4,00000002,00000000,?,?,?,6C3662A4,?,00000000), ref: 6C36696C
                                              • GetLocaleInfoW.KERNEL32(00000000,20001004,6C3662A4,00000002,00000000,?,?,?,6C3662A4,?,00000000), ref: 6C366995
                                              • GetACP.KERNEL32(?,?,6C3662A4,?,00000000), ref: 6C3669AA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID: ACP$OCP
                                              • API String ID: 2299586839-711371036
                                              • Opcode ID: 2f36c6ccb877786f28d8eb3e52f9bdcabcca9600ce94d4615daaaa3fbbf6f7dc
                                              • Instruction ID: f1bfcea8a031ae7e5e21836fdc7e4c1f4a7c9707586b865561f92af32825318b
                                              • Opcode Fuzzy Hash: 2f36c6ccb877786f28d8eb3e52f9bdcabcca9600ce94d4615daaaa3fbbf6f7dc
                                              • Instruction Fuzzy Hash: C3218132604101A6D7158F27C915A87B6FAEB41BE8B568528ED5BD7D08E733DE40CFA0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 73040311bb29c5914551622f8c1703dce3cbee9cddaee4a5e747c8be854a9458
                                              • Instruction ID: 9b87e3ac8a4b3c635a6aae269c1e094a61bec4112241ed93572b6354c3daad6f
                                              • Opcode Fuzzy Hash: 73040311bb29c5914551622f8c1703dce3cbee9cddaee4a5e747c8be854a9458
                                              • Instruction Fuzzy Hash: 78024B71E012199BDB14CFA9C880A9EFBF1FF48318F64826AD519EB740D731AA51CF90
                                              APIs
                                              • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C35F978
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: 17db3b718c216df68d84ef3ab1ca6d15ce5b8fa790b15c6c542405bb9c9465ff
                                              • Instruction ID: 746ca923db24f0e45317b50c57b038ee31a6a2cce5fbe92d89cddd22234778b9
                                              • Opcode Fuzzy Hash: 17db3b718c216df68d84ef3ab1ca6d15ce5b8fa790b15c6c542405bb9c9465ff
                                              • Instruction Fuzzy Hash: 4E7114759051686FDF11DF28CC88EEEBBB8AF09308FA441D9E059A7640DB324ED49F61
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6C34C866
                                              • IsDebuggerPresent.KERNEL32 ref: 6C34C932
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C34C94B
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 6C34C955
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                              • String ID:
                                              • API String ID: 254469556-0
                                              • Opcode ID: e80e9bd25cf814a2f4162392d179c1fb8aeab324d1c19b34e43f529a2f663fd1
                                              • Instruction ID: 7a3a955abb73cfdd59095eb31c8af15a3ca17a8dfacaf733e87687984ca18ad0
                                              • Opcode Fuzzy Hash: e80e9bd25cf814a2f4162392d179c1fb8aeab324d1c19b34e43f529a2f663fd1
                                              • Instruction Fuzzy Hash: 4A31F675D012289BDF21EFA4D9497CDBBF8EF09304F1041EAE40DAB250EB719A858F45
                                              APIs
                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 6C353BA7
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 6C353BB1
                                              • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 6C353BBE
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                              • String ID:
                                              • API String ID: 3906539128-0
                                              • Opcode ID: 0652db8422ad71c80d0a3c6b8fdd916b6f3d90ebf22e527d9e814faeb16df281
                                              • Instruction ID: c1746658752abcf58da6b19dd636a6f264abb57a3b4ecf5917f861ff35c2e4ab
                                              • Opcode Fuzzy Hash: 0652db8422ad71c80d0a3c6b8fdd916b6f3d90ebf22e527d9e814faeb16df281
                                              • Instruction Fuzzy Hash: A231B3749012289BCB61DF28D888BDDBBF8BF08314F5046EAE41CA7650EB709B858F55
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_00001770,001310D3), ref: 00131769
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 66afa8ccb0b0be25e849a7cb563303eadc9b0cedcc65ad99fed04fe5ebdccf02
                                              • Instruction ID: 0aaebe08861cea769789c4e1a5660326260ad8ad45cd7827cf7aefa5bc65ff23
                                              • Opcode Fuzzy Hash: 66afa8ccb0b0be25e849a7cb563303eadc9b0cedcc65ad99fed04fe5ebdccf02
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,6C349F53,Update.d), ref: 6C348017
                                              • FindResourceW.KERNEL32(00000000,004F0043), ref: 6C348066
                                              • LoadResource.KERNEL32(00000000,00000000), ref: 6C348074
                                              • SizeofResource.KERNEL32(00000000,00000000), ref: 6C34807E
                                              • LockResource.KERNEL32(00000000), ref: 6C348087
                                                • Part of subcall function 6C346B10: _strlen.LIBCMT ref: 6C346B9F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Resource$FindHandleLoadLockModuleSizeof_strlen
                                              • String ID: C$I$N$T
                                              • API String ID: 415223560-3924500842
                                              • Opcode ID: 2f5fd36f9b83b299d26e28396435ed9d4f06ebffc4af964dbe9772bb37c03a89
                                              • Instruction ID: 859909dcd541047c00e93b865c9be74e22e2458c54b246695374c48db4df0b52
                                              • Opcode Fuzzy Hash: 2f5fd36f9b83b299d26e28396435ed9d4f06ebffc4af964dbe9772bb37c03a89
                                              • Instruction Fuzzy Hash: 6111C6B0A05350ABD7019F348D49A7B77FCEF8B208F045919F88986201FB75DA48CBA7
                                              APIs
                                              • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,81D72CC3,QQ5l,6C35CD1F,QQ5l,?,00000000), ref: 6C35CCD1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID: QQ5l$api-ms-$ext-ms-
                                              • API String ID: 3664257935-1930512843
                                              • Opcode ID: f50775491df56803341c480a27831cbad24010ce4210241b82378ee034c5384a
                                              • Instruction ID: 5a1d4b05f22bdbb02e2d4d023d52816a7bb6bae3d1e643de7118edee379ae605
                                              • Opcode Fuzzy Hash: f50775491df56803341c480a27831cbad24010ce4210241b82378ee034c5384a
                                              • Instruction Fuzzy Hash: 67210531A42220ABD712BB69EC54E4A777CDB4776CF640214ED15A7A80D731F912CFE4
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 6C34CB70
                                              • __alloca_probe_16.LIBCMT ref: 6C34CB9C
                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 6C34CBDB
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C34CBF8
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 6C34CC37
                                              • __alloca_probe_16.LIBCMT ref: 6C34CC54
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6C34CC96
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C34CCB9
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                              • String ID:
                                              • API String ID: 2040435927-0
                                              • Opcode ID: d1c9440f7fec1be1b6aab17da26e0f1a52d8a2dc2a5c2374b0310e370d26239d
                                              • Instruction ID: 8761c681ab6cb0f5aa0a75ae35cd5daefafbc6ba6382524f37f81e9983e815ef
                                              • Opcode Fuzzy Hash: d1c9440f7fec1be1b6aab17da26e0f1a52d8a2dc2a5c2374b0310e370d26239d
                                              • Instruction Fuzzy Hash: 9851B27264121AAFEF116F58DC44FAB3BF9EF42758F208428F91096590D731DD198FA0
                                              APIs
                                              • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000002), ref: 0013101E
                                              • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00131029
                                              • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00131035
                                              • __RTC_Initialize.LIBCMT ref: 0013104D
                                              • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,001317FA), ref: 00131062
                                                • Part of subcall function 0013155C: InitializeSListHead.KERNEL32(001330C0,00131072), ref: 00131561
                                              • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_0000154F), ref: 00131080
                                              • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 0013109B
                                              • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 001310AA
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                              • String ID:
                                              • API String ID: 1933938900-0
                                              • Opcode ID: d09bfd99f33b568e9891fd37e4001243c468027e5850a2dccc773e5968d5348d
                                              • Instruction ID: 5eecc44d6380db26092910c61f75d7310ceaa975ec866e7d603b70d3874dc62c
                                              • Opcode Fuzzy Hash: d09bfd99f33b568e9891fd37e4001243c468027e5850a2dccc773e5968d5348d
                                              • Instruction Fuzzy Hash: 7E019095B8038274E9283BF91907AAE56AA1FF37A0F541925F903EA087EF65C48140B3
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: _strrchr
                                              • String ID:
                                              • API String ID: 3213747228-0
                                              • Opcode ID: a85807fc997ee618783a6036bf783e221dda6a75a837a72a657676350f801317
                                              • Instruction ID: 5a7ab3b241ac31344604ba0c87a300de40c647eea9795bda59f9a8def2d55d80
                                              • Opcode Fuzzy Hash: a85807fc997ee618783a6036bf783e221dda6a75a837a72a657676350f801317
                                              • Instruction Fuzzy Hash: 31B14272A053659FEB018E24CC81FAEBBB5EF06308F544195E840AB781D379D921CFE1
                                              APIs
                                              • _ValidateLocalCookies.LIBCMT ref: 6C34DA47
                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 6C34DA4F
                                              • _ValidateLocalCookies.LIBCMT ref: 6C34DAD8
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 6C34DB03
                                              • _ValidateLocalCookies.LIBCMT ref: 6C34DB58
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                              • String ID: csm
                                              • API String ID: 1170836740-1018135373
                                              • Opcode ID: 20abac98ba7165770c82fc00f2b42d0d6a9ebdce35637e7dc2a86f9916884b22
                                              • Instruction ID: 16741b5011d43512625bf70b917acbe5f9c9c83c64eeff5d65db991ecb3528cf
                                              • Opcode Fuzzy Hash: 20abac98ba7165770c82fc00f2b42d0d6a9ebdce35637e7dc2a86f9916884b22
                                              • Instruction Fuzzy Hash: F541BE30A00218ABCF00DF69C884ADEBBF5AF4532CF10C555E9589BB95D732DA15CFA1
                                              APIs
                                              • GetLastError.KERNEL32(?,?,6C3593A7,6C359BB5,?,?,?,?,6C34D5F2,?,?,?,?,?,00000000,00000000), ref: 6C3593BE
                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6C3593CC
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6C3593E5
                                              • SetLastError.KERNEL32(00000000,?,?,6C34D5F2,?,?,?,?,?,00000000,00000000,00000000,?,?,?), ref: 6C359437
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorLastValue___vcrt_
                                              • String ID:
                                              • API String ID: 3852720340-0
                                              • Opcode ID: a2d1e48dcf252e8f24527e32752e9c7842646e7ba7231be0abf45cda7b82f120
                                              • Instruction ID: 931edbacd4b706ea24d0eb64f7654e7e23ff9c46788ade233afe3b55829562b4
                                              • Opcode Fuzzy Hash: a2d1e48dcf252e8f24527e32752e9c7842646e7ba7231be0abf45cda7b82f120
                                              • Instruction Fuzzy Hash: 4701B9B2709335AFDB561AB65C85D972BBCEB0327C760032DE520499D0EF128C269975
                                              APIs
                                              • type_info::operator==.LIBVCRUNTIME ref: 6C359DC2
                                              • CallUnexpected.LIBVCRUNTIME ref: 6C35A03B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: CallUnexpectedtype_info::operator==
                                              • String ID: csm$csm$csm
                                              • API String ID: 2673424686-393685449
                                              • Opcode ID: 614c416ff8fd2f4670c7e8fe8aa3583bbc81694be67245fad93f1041643ce25a
                                              • Instruction ID: a73035a36473c69de37eff38ca82b4237fbce2e80e5ffeb3dfeae19a94b8ba07
                                              • Opcode Fuzzy Hash: 614c416ff8fd2f4670c7e8fe8aa3583bbc81694be67245fad93f1041643ce25a
                                              • Instruction Fuzzy Hash: 22B17BB1800309EFCF04CFA5C980E9EB7B5FF0431AB94415AE8556BA05D736DA66CF92
                                              APIs
                                              • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00131D85
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00131D92
                                              • _CxxThrowException.VCRUNTIME140(?,001327B4), ref: 00131E99
                                              • _CxxThrowException.VCRUNTIME140(?,00132808), ref: 00131EB6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$_callnewhmalloc
                                              • String ID: Unknown exception
                                              • API String ID: 4113974480-410509341
                                              • Opcode ID: cb1a2fdd7da977d293cac28eec858d3661b3bcf7d35feac4506a7681ec7d2480
                                              • Instruction ID: ff7c6fcd44f1e03a06c02b4c6b2489bd1ec6acf30fe96d92a028aa0180b52845
                                              • Opcode Fuzzy Hash: cb1a2fdd7da977d293cac28eec858d3661b3bcf7d35feac4506a7681ec7d2480
                                              • Instruction Fuzzy Hash: 31F0F63490430D77CF08BAE8EC0AD6D77AD5E11750FA08574FD1896091EB71EA59C1C0
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,81D72CC3,?,?,00000000,6C36C7DD,000000FF,?,6C3526D0,6C3525AA,?,6C35276C,00000000), ref: 6C352644
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C352656
                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,6C36C7DD,000000FF,?,6C3526D0,6C3525AA,?,6C35276C,00000000), ref: 6C352678
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-1276376045
                                              • Opcode ID: 411cf6ed470d1afe8afd5c0a0dfda371e5fa45db5e43f25d2f8a8eaec955da4f
                                              • Instruction ID: 764b598429bb7ecdcc553e7e364cbd07c8270c41a6a1e61d212a6b86370600ed
                                              • Opcode Fuzzy Hash: 411cf6ed470d1afe8afd5c0a0dfda371e5fa45db5e43f25d2f8a8eaec955da4f
                                              • Instruction Fuzzy Hash: 44016731504629BFDF029F50CC09FAE7BFCFB05755F000925F821A2690DB799500CEA4
                                              APIs
                                              • PeekConsoleInputA.KERNEL32(?,gfff,6C379D70,00000000,?,6C353746,00000000,0000000C,6C379D70,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360B35
                                              • GetLastError.KERNEL32(?,6C353746,00000000,0000000C,6C379D70,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360B41
                                                • Part of subcall function 6C360C1D: CloseHandle.KERNEL32(FFFFFFFF,6C360B05,?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C2D
                                              • ___initconin.LIBCMT ref: 6C360B51
                                                • Part of subcall function 6C360BFE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C360A79,6C3536CB,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C11
                                              • PeekConsoleInputA.KERNEL32(?,?,FFFFFFFF,?,6C353746,00000000,0000000C,6C379D70,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360B65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ConsoleInputPeek$CloseCreateErrorFileHandleLast___initconin
                                              • String ID: gfff
                                              • API String ID: 1545762386-1553575800
                                              • Opcode ID: 35a7c7e8fcfc15a9038b7787e9e93b7e6e3ead95259bd628ca3308839cc6fb47
                                              • Instruction ID: eab79c8cbf2cb7ebb6c296c55055f74dcd57a3e219a2ccce618169d5de18cecd
                                              • Opcode Fuzzy Hash: 35a7c7e8fcfc15a9038b7787e9e93b7e6e3ead95259bd628ca3308839cc6fb47
                                              • Instruction Fuzzy Hash: 5BF01C36901168BB8F532FA6DC099DD3F7AFB0A3687048010F91897520C632C920DFA9
                                              APIs
                                              • __alloca_probe_16.LIBCMT ref: 6C35D42A
                                              • __alloca_probe_16.LIBCMT ref: 6C35D4F3
                                              • __freea.LIBCMT ref: 6C35D55A
                                                • Part of subcall function 6C35A641: HeapAlloc.KERNEL32(00000000,6C35DBE2,?,?,6C35DBE2,00000220,?,?,?), ref: 6C35A673
                                              • __freea.LIBCMT ref: 6C35D56D
                                              • __freea.LIBCMT ref: 6C35D57A
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: __freea$__alloca_probe_16$AllocHeap
                                              • String ID:
                                              • API String ID: 1096550386-0
                                              • Opcode ID: 1ded055718f7974c1c73e47638283ce43778605802951de726e2bba56bceefd1
                                              • Instruction ID: 8e2392c1874ffa46c5d6ec88d66d09ad3d3a7ba1a9c4f9461c0015ca9866f07f
                                              • Opcode Fuzzy Hash: 1ded055718f7974c1c73e47638283ce43778605802951de726e2bba56bceefd1
                                              • Instruction Fuzzy Hash: 9351D4B2601206AFEB009F65DD80EBB3BADDF4475CBA10928FD14D6A54EB31DC24CE61
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C334CD5
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C334CEF
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C334D10
                                              • __Getctype.LIBCPMT ref: 6C334DC4
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C334DF7
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getctype
                                              • String ID:
                                              • API String ID: 3087743877-0
                                              • Opcode ID: 32d8d40f6c9f493f3ba35461c8126589489aa1d5830e7d6cb549ea54d2669821
                                              • Instruction ID: 4e3b3fb140a12522a8230e12f1d19317ac037658f5e308bd410b2e694e35f133
                                              • Opcode Fuzzy Hash: 32d8d40f6c9f493f3ba35461c8126589489aa1d5830e7d6cb549ea54d2669821
                                              • Instruction Fuzzy Hash: 404159B1E002648FCB12DF98D850BDEBBF4FB44718F148129D859ABB91D736A944CFA1
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 6C34B2D6
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C34B2E1
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C34B34F
                                                • Part of subcall function 6C34B1D8: std::locale::_Locimp::_Locimp.LIBCPMT ref: 6C34B1F0
                                              • std::locale::_Setgloballocale.LIBCPMT ref: 6C34B2FC
                                              • _Yarn.LIBCPMT ref: 6C34B312
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                              • String ID:
                                              • API String ID: 1088826258-0
                                              • Opcode ID: 585e0ad90f80e3ba70500f74f62d842dba65733daa8c9dfd04793721aa4574bb
                                              • Instruction ID: 800286fe2a31482184f5d17a16c4d058c935d065802c8de9aaf5c8293b284367
                                              • Opcode Fuzzy Hash: 585e0ad90f80e3ba70500f74f62d842dba65733daa8c9dfd04793721aa4574bb
                                              • Instruction Fuzzy Hash: 55018F75600621DFCB06EB21D844AFD7BB6BF85658B158009D8516B780CF34AA0ACFEA
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: DeleteFileFolderPath_strlen
                                              • String ID: n77l
                                              • API String ID: 1809683544-261759358
                                              • Opcode ID: 6da41819731b65f6062abad57139b33248abbffc7d9f190514f5cdf8d613c8be
                                              • Instruction ID: 4b41578cb4a594699f7af9e6382a08af693ebce79d82259eb0926afd9c4dc057
                                              • Opcode Fuzzy Hash: 6da41819731b65f6062abad57139b33248abbffc7d9f190514f5cdf8d613c8be
                                              • Instruction Fuzzy Hash: 1FC1DFB1D002548FDB10CFA8C9807AEBBF1BF45308F148669D855AB791E7759A88CF92
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 4218353326-1866435925
                                              • Opcode ID: 860d7b61345b323a9864ab7f2cbbc9441926c0867e802ef7c6e355d3a258afc6
                                              • Instruction ID: fa8b98465a92658ea79ae62f45f91192ff27bc8a7b80a8c1054bd75afc713e13
                                              • Opcode Fuzzy Hash: 860d7b61345b323a9864ab7f2cbbc9441926c0867e802ef7c6e355d3a258afc6
                                              • Instruction Fuzzy Hash: 92C14975A006659FDB04CF68C580B9DBBB2FF48328F688258E819AB795C335ED45CF90
                                              APIs
                                                • Part of subcall function 6C35A893: GetLastError.KERNEL32(?,?,6C355151,?,6C331A6D,00000000), ref: 6C35A897
                                                • Part of subcall function 6C35A893: SetLastError.KERNEL32(00000000,6C331A6D,00000000), ref: 6C35A939
                                              • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,6C35B1CB,?,?,?,00000055,?,-00000050,?,?,?), ref: 6C365931
                                              • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,6C35B1CB,?,?,?,00000055,?,-00000050,?,?), ref: 6C365968
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CodePageValid
                                              • String ID: PX7lE$utf8
                                              • API String ID: 943130320-794986275
                                              • Opcode ID: bb926ca2917896283730380f72d6832eda7ca8bf2d10e86766b81c5f3c8b0d84
                                              • Instruction ID: 0148f5f3364b7006a4dcbac00689888ab68ebc0f05a12030bfa472e6e570157d
                                              • Opcode Fuzzy Hash: bb926ca2917896283730380f72d6832eda7ca8bf2d10e86766b81c5f3c8b0d84
                                              • Instruction Fuzzy Hash: D0512732605302AAE7169B33CC85FA673A8EF05718F14043AE5969BE8AF771D5448F62
                                              APIs
                                                • Part of subcall function 6C34B2CF: __EH_prolog3.LIBCMT ref: 6C34B2D6
                                                • Part of subcall function 6C34B2CF: std::_Lockit::_Lockit.LIBCPMT ref: 6C34B2E1
                                                • Part of subcall function 6C34B2CF: std::locale::_Setgloballocale.LIBCPMT ref: 6C34B2FC
                                                • Part of subcall function 6C34B2CF: _Yarn.LIBCPMT ref: 6C34B312
                                                • Part of subcall function 6C34B2CF: std::_Lockit::~_Lockit.LIBCPMT ref: 6C34B34F
                                                • Part of subcall function 6C334CA0: std::_Lockit::_Lockit.LIBCPMT ref: 6C334CD5
                                                • Part of subcall function 6C334CA0: std::_Lockit::_Lockit.LIBCPMT ref: 6C334CEF
                                                • Part of subcall function 6C334CA0: std::_Lockit::~_Lockit.LIBCPMT ref: 6C334D10
                                                • Part of subcall function 6C334CA0: __Getctype.LIBCPMT ref: 6C334DC4
                                                • Part of subcall function 6C334CA0: std::_Lockit::~_Lockit.LIBCPMT ref: 6C334DF7
                                              • std::ios_base::_Addstd.LIBCPMT ref: 6C33BE72
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_$AddstdGetctypeH_prolog3SetgloballocaleYarnstd::ios_base::_std::locale::_
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 3375204848-1866435925
                                              • Opcode ID: b357c968911c19e1cd89a826c22fa2ccc5c08f78e8f538c68f8aa1cc5be5acdb
                                              • Instruction ID: 01f91f253172c6253900bf584b9ff5e33ad610d4b913212330e968b58493d651
                                              • Opcode Fuzzy Hash: b357c968911c19e1cd89a826c22fa2ccc5c08f78e8f538c68f8aa1cc5be5acdb
                                              • Instruction Fuzzy Hash: C151DFB5A017498FDB00CF64D8457AEBBB0FF44318F10822CE91A6BB90E776A945CF91
                                              APIs
                                                • Part of subcall function 6C34B51D: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6C34B529
                                              • _strlen.LIBCMT ref: 6C332718
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: _strlenstd::invalid_argument::invalid_argument
                                              • String ID: Y.3l$ios_base::badbit set$string too long
                                              • API String ID: 4097767454-1212843285
                                              • Opcode ID: bfbad5e4ba5b2e7aa58d725ef53f0292fcb2d89f9d99757a303fa161b794cf35
                                              • Instruction ID: d81cadff287fa76a0d80695e77e1cafcc3e8164f542c5e5ba563c2157c88fa3e
                                              • Opcode Fuzzy Hash: bfbad5e4ba5b2e7aa58d725ef53f0292fcb2d89f9d99757a303fa161b794cf35
                                              • Instruction Fuzzy Hash: 724192B2C102589BCB10CF64DD88ADEBBB9FF48314F250225E848A7741E7369958CFE1
                                              APIs
                                              • __current_exception.VCRUNTIME140 ref: 001317AF
                                              • __current_exception_context.VCRUNTIME140 ref: 001317B9
                                              • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 001317C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2142801582.0000000000131000.00000020.00000001.01000000.00000005.sdmp, Offset: 00130000, based on PE: true
                                              • Associated: 00000004.00000002.2142787708.0000000000130000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143000631.0000000000132000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143014884.0000000000133000.00000004.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000134000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              • Associated: 00000004.00000002.2143026837.0000000000176000.00000002.00000001.01000000.00000005.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_130000_Update.jbxd
                                              Similarity
                                              • API ID: __current_exception__current_exception_contextterminate
                                              • String ID: csm
                                              • API String ID: 2542180945-1018135373
                                              • Opcode ID: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                              • Instruction ID: 312e07bff2ff196932186f840e1d25b2ea5108a32abf35ec750716c51321cc56
                                              • Opcode Fuzzy Hash: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                              • Instruction Fuzzy Hash: 84F0A037800300BFDB345EA9948555DF7AEBE62361F5C4856E488CBB10CB30ED92C6D2
                                              APIs
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,6C363F2D,?,?,00000000,?,?,?,6C363DEB,00000002,FlsGetValue,6C3717C4,6C3717CC), ref: 6C363E9E
                                              • GetLastError.KERNEL32(?,6C363F2D,?,?,00000000,?,?,?,6C363DEB,00000002,FlsGetValue,6C3717C4,6C3717CC,?,?,6C3593D1), ref: 6C363EA8
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?), ref: 6C363ED0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID: api-ms-
                                              • API String ID: 3177248105-2084034818
                                              • Opcode ID: 69111436ca811bcfd8b4573fc2dcf776bd35eb83eba1ed0826b8d4c0f0ec28b3
                                              • Instruction ID: c8afe50d9129c88ca69379798d4a86447282c2b61837788d89c59205bed3eb91
                                              • Opcode Fuzzy Hash: 69111436ca811bcfd8b4573fc2dcf776bd35eb83eba1ed0826b8d4c0f0ec28b3
                                              • Instruction Fuzzy Hash: FDE04F3239530DB7EF121E62DC06B593B79EB03B45F204420FA0CE9C95D762E510DE68
                                              APIs
                                              • AcquireSRWLockExclusive.KERNEL32(6C37C354,G.3l,?,6C332362,6C37C244,?,00000001,?,?,?,?,?,?,?), ref: 6C34AAE9
                                              • ReleaseSRWLockExclusive.KERNEL32(6C37C354,?,6C332362,6C37C244,?,00000001,?,?,?,?,?,?,?), ref: 6C34AB1C
                                              • WakeAllConditionVariable.KERNEL32(6C37C350,?,6C332362,6C37C244,?,00000001,?,?,?,?,?,?,?), ref: 6C34AB27
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ExclusiveLock$AcquireConditionReleaseVariableWake
                                              • String ID: G.3l
                                              • API String ID: 1466638765-2772147249
                                              • Opcode ID: 3a0de91cdbf799f30e3efe49c7617190aba1f6827fc93d1bf05104e23711d25a
                                              • Instruction ID: f62bb30420e60d7cd64b006af277620dd27ec67f4fcb5690dd9395f123dc0159
                                              • Opcode Fuzzy Hash: 3a0de91cdbf799f30e3efe49c7617190aba1f6827fc93d1bf05104e23711d25a
                                              • Instruction Fuzzy Hash: 8CF03975601660DFDB07EF68E44885477BCFB0B314B04405AEA058BB01CA386901CFB8
                                              APIs
                                              • GetConsoleOutputCP.KERNEL32(81D72CC3,00000000,00000000,?), ref: 6C361629
                                                • Part of subcall function 6C35A751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C35D550,?,00000000,-00000008), ref: 6C35A7B2
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6C36187B
                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6C3618C1
                                              • GetLastError.KERNEL32 ref: 6C361964
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                              • String ID:
                                              • API String ID: 2112829910-0
                                              • Opcode ID: 46d53c443b5b7c635512a9b6916e5f1992b12c6f015883d22df6c566e2ebb246
                                              • Instruction ID: cbf0ce3727a7b1a1d894ffdcb079f39a08773a0e6010dab5bbb7671b385ff859
                                              • Opcode Fuzzy Hash: 46d53c443b5b7c635512a9b6916e5f1992b12c6f015883d22df6c566e2ebb246
                                              • Instruction Fuzzy Hash: 62D17A75E042589FDF05CFA9C880AEDBBF9EF09304F24416AE456ABB45D630E901CFA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: AdjustPointer
                                              • String ID:
                                              • API String ID: 1740715915-0
                                              • Opcode ID: 46119193e2be4b3eb1e353fd009c5be60580b87f2fcad71685e60aee489d01b7
                                              • Instruction ID: dc0889707bc15df83b3332c9771a4db820b77785ddff873e6a5ce1fb9aa95baf
                                              • Opcode Fuzzy Hash: 46119193e2be4b3eb1e353fd009c5be60580b87f2fcad71685e60aee489d01b7
                                              • Instruction Fuzzy Hash: 8851F5B6A06306AFEB159F14D840FAA77B4FF44308FA1452DDC5547A90D732E866CFA0
                                              APIs
                                              • _strlen.LIBCMT ref: 6C3352FB
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 6C3353A7
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 6C3353B3
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 6C3353BF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_task$_strlen
                                              • String ID:
                                              • API String ID: 3047427315-0
                                              • Opcode ID: 850fbb81ab9f0e21fe82222c91631bcd73d30e34d68d12fe271d86d8ce4bc0fb
                                              • Instruction ID: 0010cb70596bc87dfb9538e172ffd9c1e5e0061f4f97b614bc11ab20c76a86dd
                                              • Opcode Fuzzy Hash: 850fbb81ab9f0e21fe82222c91631bcd73d30e34d68d12fe271d86d8ce4bc0fb
                                              • Instruction Fuzzy Hash: BB41D2B1C007988FDB00CFA4D841B9EBBF4AF05318F088569D4599B740E7B6D608CFA2
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C334EA5
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C334EC2
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C334EE3
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C334F79
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                              • String ID:
                                              • API String ID: 593203224-0
                                              • Opcode ID: 0920912d1cadf89615d8e51d6a0725be8cfb365bb123663613a5715f23fbdfe2
                                              • Instruction ID: 0927c1422bfdb3a953ad1b27f54ce5c07c13c2b373a5ba23b0ea7d561ee37989
                                              • Opcode Fuzzy Hash: 0920912d1cadf89615d8e51d6a0725be8cfb365bb123663613a5715f23fbdfe2
                                              • Instruction Fuzzy Hash: AC413C71D002688FCB11DF94D844BDEBBF4FB48718F048269E8596B790E736A944CFA1
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C33B515
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C33B52F
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C33B550
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C33B625
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                              • String ID:
                                              • API String ID: 593203224-0
                                              • Opcode ID: 3eaa24341e6f758d0fa39fd85937eeb500dd676ea2d1dcbc5f790066ea0d9902
                                              • Instruction ID: 80ea1278c1395ddeb09f0e34330fb04f449973cb2173d31ee7de68353f052982
                                              • Opcode Fuzzy Hash: 3eaa24341e6f758d0fa39fd85937eeb500dd676ea2d1dcbc5f790066ea0d9902
                                              • Instruction Fuzzy Hash: FF415971E006688FDF11DF94D454BAEB7F4FB44718F048228D899ABB80DB35A944CFA5
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C332EE5
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C332EFF
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C332F20
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C332FF5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                              • String ID:
                                              • API String ID: 593203224-0
                                              • Opcode ID: 7754cd97aa17c52b78b6354ddc8f84f23774ac6a6bd751ed9d31e3d677d89700
                                              • Instruction ID: 079159817a367b52eb1d27f964b6f637ce23263ac7e020d2209eb0b71869dd72
                                              • Opcode Fuzzy Hash: 7754cd97aa17c52b78b6354ddc8f84f23774ac6a6bd751ed9d31e3d677d89700
                                              • Instruction Fuzzy Hash: 8F414771E002648FCB11DF98C944B9EB7F4FB48718F148229D859AB791DB36A944CFE1
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C33CBA5
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C33CBBF
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C33CBE0
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C33CCB5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                              • String ID:
                                              • API String ID: 593203224-0
                                              • Opcode ID: 48f98a38ef892427afb6cb3bfd1b395011914ff652b71069f04b608362c172fe
                                              • Instruction ID: 40e026b47b19c069dc6d1bff17d361531bd93001e3a95301cbab794dc414ce29
                                              • Opcode Fuzzy Hash: 48f98a38ef892427afb6cb3bfd1b395011914ff652b71069f04b608362c172fe
                                              • Instruction Fuzzy Hash: 1F416A71E002648FCB01EF98D440B9DB7F4FF44B18F048228C499ABB50D735A945CFA5
                                              APIs
                                                • Part of subcall function 6C35A751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C35D550,?,00000000,-00000008), ref: 6C35A7B2
                                              • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 6C35F6C9
                                              • __dosmaperr.LIBCMT ref: 6C35F6D0
                                              • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 6C35F70A
                                              • __dosmaperr.LIBCMT ref: 6C35F711
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 1913693674-0
                                              • Opcode ID: efd801e0624160df078591360f236873d339516fe3d423f570a2e91de9d0468e
                                              • Instruction ID: bfc9833f298e803ad3753ec72b37e169953a2e5ba7ab55196ec2ab41743286c5
                                              • Opcode Fuzzy Hash: efd801e0624160df078591360f236873d339516fe3d423f570a2e91de9d0468e
                                              • Instruction Fuzzy Hash: 5821C571604205AFDB119FA6CC80D5AB7BDFF093AC7848619F89497A50D732EC208F61
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6f3e96ff922cf3f4a6f0ded7a67066e3714c89128954c0b1453396850bc32f2
                                              • Instruction ID: 7a9f9f2333dbfc9643395953fbd8bab81f5851f8dadc4ec79f2afac05c138e15
                                              • Opcode Fuzzy Hash: b6f3e96ff922cf3f4a6f0ded7a67066e3714c89128954c0b1453396850bc32f2
                                              • Instruction Fuzzy Hash: 9F217932204216BBDB01AF669D80D9A77EDEF0A36C718C615E85997A40EB32EC108F71
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32 ref: 6C360C90
                                                • Part of subcall function 6C35A751: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6C35D550,?,00000000,-00000008), ref: 6C35A7B2
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6C360CC8
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6C360CE8
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 158306478-0
                                              • Opcode ID: a02f0814439b8733358e848295eb2c40bf982d763134379c131d0d187862dee1
                                              • Instruction ID: 54dbac194236c808ba33902e6270c10f464052079b91860ab289c746fdb1186d
                                              • Opcode Fuzzy Hash: a02f0814439b8733358e848295eb2c40bf982d763134379c131d0d187862dee1
                                              • Instruction Fuzzy Hash: CA1104B16016697FA70227B7CC8ECAF69ACDF4A29C3500214F90091A04FB71DD1099BA
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,-00000A64,?,00000000,?,6C340BAE,?), ref: 6C3407C6
                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?), ref: 6C340803
                                              • WideCharToMultiByte.KERNEL32 ref: 6C340833
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 6C340862
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 626452242-0
                                              • Opcode ID: f91efc054748a7bf487abb3b2db857bd6efe50b7536922fd67c5dbb11ff7cc68
                                              • Instruction ID: b8442d795407c92c45070037ce4e2698cad1cb05dbdd80feee3fab9432fbc4c1
                                              • Opcode Fuzzy Hash: f91efc054748a7bf487abb3b2db857bd6efe50b7536922fd67c5dbb11ff7cc68
                                              • Instruction Fuzzy Hash: D6113B71A053043BF6105B219C09F677AECDB87778F144324F6285A2D0EA71A5088AB3
                                              APIs
                                              • WriteConsoleW.KERNEL32(00000000,6C3607FB,00000000,00000000,00000000,?,6C36A519,00000000,00000001,00000000,?,?,6C3619B8,?,00000000,00000000), ref: 6C36B20E
                                              • GetLastError.KERNEL32(?,6C36A519,00000000,00000001,00000000,?,?,6C3619B8,?,00000000,00000000,?,?,?,6C3612FE,?), ref: 6C36B21A
                                                • Part of subcall function 6C36B26B: CloseHandle.KERNEL32(FFFFFFFE,6C36B22A,?,6C36A519,00000000,00000001,00000000,?,?,6C3619B8,?,00000000,00000000,?,?), ref: 6C36B27B
                                              • ___initconout.LIBCMT ref: 6C36B22A
                                                • Part of subcall function 6C36B24C: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6C36B1E8,6C36A506,?,?,6C3619B8,?,00000000,00000000,?), ref: 6C36B25F
                                              • WriteConsoleW.KERNEL32(00000000,6C3607FB,00000000,00000000,?,6C36A519,00000000,00000001,00000000,?,?,6C3619B8,?,00000000,00000000,?), ref: 6C36B23F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                              • String ID:
                                              • API String ID: 2744216297-0
                                              • Opcode ID: cef9be8299df799bf7fbf0544a9eb6678d21155eb21d3b62d30f5df56de3d84f
                                              • Instruction ID: 970bd2a074f88ab825067e251b8af778504a4ee22659eee6179ea7e380dfdbf0
                                              • Opcode Fuzzy Hash: cef9be8299df799bf7fbf0544a9eb6678d21155eb21d3b62d30f5df56de3d84f
                                              • Instruction Fuzzy Hash: F5F03736501224BBCF131FA6CC0598D3F79FB47368B044011FD1885920C7328820EFE5
                                              APIs
                                              • ReadConsoleInputW.KERNEL32(0000000C,6C379D90,6C353444,00000000,?,6C3534C8,00000000,00000001,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360A9D
                                              • GetLastError.KERNEL32(?,6C3534C8,00000000,00000001,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360AA9
                                                • Part of subcall function 6C360C1D: CloseHandle.KERNEL32(FFFFFFFF,6C360B05,?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C2D
                                              • ___initconin.LIBCMT ref: 6C360AB9
                                                • Part of subcall function 6C360BFE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C360A79,6C3536CB,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C11
                                              • ReadConsoleInputW.KERNEL32(0000000C,6C379D90,6C353444,?,6C3534C8,00000000,00000001,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360ACD
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ConsoleInputRead$CloseCreateErrorFileHandleLast___initconin
                                              • String ID:
                                              • API String ID: 838051604-0
                                              • Opcode ID: c1b934ad0343354131809d2f85cd35c2ff3ae813f73bad364deaa4c9678b66fe
                                              • Instruction ID: 69baa3542cb86304044d80c1266730dd02244d913f51a8dd234352c64add0979
                                              • Opcode Fuzzy Hash: c1b934ad0343354131809d2f85cd35c2ff3ae813f73bad364deaa4c9678b66fe
                                              • Instruction Fuzzy Hash: 02F01236101168BBCF131F96CC058D93F7AFB4A3A47054050FA1496520CA32C920DFD5
                                              APIs
                                              • GetSystemTimeAsFileTime.KERNEL32(00000001), ref: 6C34D1D9
                                              • GetCurrentThreadId.KERNEL32 ref: 6C34D1E8
                                              • GetCurrentProcessId.KERNEL32 ref: 6C34D1F1
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 6C34D1FE
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                              • String ID:
                                              • API String ID: 2933794660-0
                                              • Opcode ID: 4eaae1ee850fe7e0d63d796f4b5ca4f178d5400e6734ce5c62e6e929cde2c5d6
                                              • Instruction ID: 86a5223be9c87e8d2aee9dfc143423d976633c70133abe214687f896c92d8130
                                              • Opcode Fuzzy Hash: 4eaae1ee850fe7e0d63d796f4b5ca4f178d5400e6734ce5c62e6e929cde2c5d6
                                              • Instruction Fuzzy Hash: 66F05F74D1121DEBCF02DBB4C64999EBBF8EF1E200B9545A6A412E6140E630AA44DF64
                                              APIs
                                              • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360AE9
                                              • GetLastError.KERNEL32(?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360AF5
                                                • Part of subcall function 6C360C1D: CloseHandle.KERNEL32(FFFFFFFF,6C360B05,?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C2D
                                              • ___initconin.LIBCMT ref: 6C360B05
                                                • Part of subcall function 6C360BFE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C360A79,6C3536CB,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C11
                                              • GetNumberOfConsoleInputEvents.KERNEL32(?,?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360B13
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ConsoleEventsInputNumber$CloseCreateErrorFileHandleLast___initconin
                                              • String ID:
                                              • API String ID: 1600138625-0
                                              • Opcode ID: 3dba5a97139016d32f1f2637c2db7fbaacb9180758583fea4781b9e1ae77fff5
                                              • Instruction ID: 8c2fbba60c62188660e961e88ba23d510e541fcc4ba61d295d2d5011d84a009e
                                              • Opcode Fuzzy Hash: 3dba5a97139016d32f1f2637c2db7fbaacb9180758583fea4781b9e1ae77fff5
                                              • Instruction Fuzzy Hash: E9E0BF366001787B8F132BBAD84A9C93E79EB473A97064170F90997A14DB22C950DFF9
                                              APIs
                                              • GetConsoleMode.KERNEL32(0000000C,?,?,6C3534A7,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360B81
                                              • GetLastError.KERNEL32(?,6C3534A7,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360B8D
                                                • Part of subcall function 6C360C1D: CloseHandle.KERNEL32(FFFFFFFF,6C360B05,?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C2D
                                              • ___initconin.LIBCMT ref: 6C360B9D
                                                • Part of subcall function 6C360BFE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C360A79,6C3536CB,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C11
                                              • GetConsoleMode.KERNEL32(0000000C,?,6C3534A7,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360BAB
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                              • String ID:
                                              • API String ID: 3067319862-0
                                              • Opcode ID: 7575863c98764fc791391002398361c4fc572867a705777977734ec96c2c82d8
                                              • Instruction ID: 4a64e22271f232db6043584af7298d1f08bc2cc9d8dc82520473fe5bb22dcb8e
                                              • Opcode Fuzzy Hash: 7575863c98764fc791391002398361c4fc572867a705777977734ec96c2c82d8
                                              • Instruction Fuzzy Hash: B4E04835600279BB8F132BA7D8095C93F79EB077A93054160F909D3A14DB21C850DFE9
                                              APIs
                                              • SetConsoleMode.KERNEL32(0000000C,00000000,?,6C3534AF,00000000,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360BC7
                                              • GetLastError.KERNEL32(?,6C3534AF,00000000,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360BD3
                                                • Part of subcall function 6C360C1D: CloseHandle.KERNEL32(FFFFFFFF,6C360B05,?,6C3536DC,0000000C,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C2D
                                              • ___initconin.LIBCMT ref: 6C360BE3
                                                • Part of subcall function 6C360BFE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C360A79,6C3536CB,66666667,?,?,6C3533F4,6C379D70,0000000C,6C331B27), ref: 6C360C11
                                              • SetConsoleMode.KERNEL32(0000000C,?,6C3534AF,00000000,?,6C379DB0,00000038,6C353444,6C379D90,0000000C,6C331B30), ref: 6C360BF1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                              • String ID:
                                              • API String ID: 3067319862-0
                                              • Opcode ID: fd0930aeabd7dcaf16a9bb624e44b0f2199f089f4ec9e9f451778468a87740d2
                                              • Instruction ID: 638332ea52d71b2df08d64f176cbea2b178069b15ada981b46687606ea08eeaa
                                              • Opcode Fuzzy Hash: fd0930aeabd7dcaf16a9bb624e44b0f2199f089f4ec9e9f451778468a87740d2
                                              • Instruction Fuzzy Hash: 42E04F326412746BCF132BE6DC099CA7E79EB073B93044160F90993A14DA22C890DFE9
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: __aulldiv
                                              • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                              • API String ID: 3732870572-1956417402
                                              • Opcode ID: 1132bdf5647e76309ab8dbbadd467d8017c4d738c7c8644769a209734cb2bc7a
                                              • Instruction ID: ea2d73a124531d651f0bf46c4fa063caae03231a997144bc320bd9f6a6c6e1df
                                              • Opcode Fuzzy Hash: 1132bdf5647e76309ab8dbbadd467d8017c4d738c7c8644769a209734cb2bc7a
                                              • Instruction Fuzzy Hash: 41611B70E04A499FDB118F69D480BAEBBF9AF8630CF14C099D590DFB40C77589818F61
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: __alloca_probe_16__freea
                                              • String ID: gfff
                                              • API String ID: 1635606685-1553575800
                                              • Opcode ID: 974e2bc77bec37d5d2480c09ea2d68a34d970da8ad9075a9cd70c0e3cb141a03
                                              • Instruction ID: 90d68e0c031ef2d4ee08de4919987b2ba8b86ed1e146050ec0437a2fe2972efa
                                              • Opcode Fuzzy Hash: 974e2bc77bec37d5d2480c09ea2d68a34d970da8ad9075a9cd70c0e3cb141a03
                                              • Instruction Fuzzy Hash: A53128B2E016159FCB518AA9C840E5EB7B89F4175CBE1062DCC6097E40E732D9258FA0
                                              APIs
                                              • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,6C359FC8,?,?,00000000,00000000,00000000,?), ref: 6C35A0EC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: EncodePointer
                                              • String ID: MOC$RCC
                                              • API String ID: 2118026453-2084237596
                                              • Opcode ID: dee719a061b2e071672e55d0b37fd63da70e56f6ccf3f5fc1e85158f5735346a
                                              • Instruction ID: 2e8db821fbfdb121354db75b30d474c8e132ee75daad49538dd4023defd8dfd2
                                              • Opcode Fuzzy Hash: dee719a061b2e071672e55d0b37fd63da70e56f6ccf3f5fc1e85158f5735346a
                                              • Instruction Fuzzy Hash: 39414B71A00209AFCF06CF94CC80EEE7BB5FF48308F558159E91567651D3369A60EFA1
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 6C3330E6
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 6C333222
                                                • Part of subcall function 6C34B0F3: _Yarn.LIBCPMT ref: 6C34B113
                                                • Part of subcall function 6C34B0F3: _Yarn.LIBCPMT ref: 6C34B137
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                              • String ID: bad locale name
                                              • API String ID: 2070049627-1405518554
                                              • Opcode ID: c106880b78887991b0c7f5bd8072e3c9ba7cb831564e78b4a39bfd2e8c23df54
                                              • Instruction ID: 28d03c704ee5c06246ef4f3b1749d63eadf2ce0c178f0630551a1ef76a62ec59
                                              • Opcode Fuzzy Hash: c106880b78887991b0c7f5bd8072e3c9ba7cb831564e78b4a39bfd2e8c23df54
                                              • Instruction Fuzzy Hash: CD413EF1E006559BEB10DF69D804B57BAE8BB04708F004528E49997B40E37AE528CFE6
                                              APIs
                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 6C359BAA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ___except_validate_context_record
                                              • String ID: csm$csm
                                              • API String ID: 3493665558-3733052814
                                              • Opcode ID: b0bec61a62d542cf91a7177b7362eb6ca8c0b4d09d1f8803a9934623883a159c
                                              • Instruction ID: 341f25ab87e8c2bc97e052f6fead22fe8a90a9ae100eadce1c3b3af2ce94b4ca
                                              • Opcode Fuzzy Hash: b0bec61a62d542cf91a7177b7362eb6ca8c0b4d09d1f8803a9934623883a159c
                                              • Instruction Fuzzy Hash: 113170B1514318AFCF129F51CC40D9A7BA9FB09759B98465AFC5449520C333D873DF92
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: _strlen
                                              • String ID: Y.3l$ios_base::badbit set
                                              • API String ID: 4218353326-2689785181
                                              • Opcode ID: 64dc6e851a89e91844dd135f397f455f90e5e8039d552f1901e28835f2b53bb8
                                              • Instruction ID: 65e0e46ceac1d75c30211c3025ecfac72469a7f609390d7f930e099dc81870b2
                                              • Opcode Fuzzy Hash: 64dc6e851a89e91844dd135f397f455f90e5e8039d552f1901e28835f2b53bb8
                                              • Instruction Fuzzy Hash: 853193B2D002689BDB10DF64D948BDEBBB5FF44324F245225E848A7741E3325A94CFE1
                                              APIs
                                              • AcquireSRWLockExclusive.KERNEL32(6C37C354,?,G.3l,?,6C33233F,6C37C244,ios_base::badbit set,?,6C332E47,?,00000001), ref: 6C34AA9B
                                              • ReleaseSRWLockExclusive.KERNEL32(6C37C354,?,6C33233F,6C37C244,ios_base::badbit set,?,6C332E47,?,00000001,?,?,?,?,?,?,?), ref: 6C34AAD5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2143639855.000000006C331000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C330000, based on PE: true
                                              • Associated: 00000004.00000002.2143625133.000000006C330000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143704154.000000006C36D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143719857.000000006C37B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000004.00000002.2143733155.000000006C380000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6c330000_Update.jbxd
                                              Similarity
                                              • API ID: ExclusiveLock$AcquireRelease
                                              • String ID: G.3l
                                              • API String ID: 17069307-2772147249
                                              • Opcode ID: 8df2b36c67b3cb815839ee6341bebfa9c773415080df3c799728c88db8b0b3b8
                                              • Instruction ID: 3fa89b88c90f6707fac4c3e46231f8ddba9de771f31ef84d6aa832c329497ae6
                                              • Opcode Fuzzy Hash: 8df2b36c67b3cb815839ee6341bebfa9c773415080df3c799728c88db8b0b3b8
                                              • Instruction Fuzzy Hash: 6BF08C35200255CFDB229F18D504A65B7F8FB87738F14822AEAA543A80C7381842CE65